↓ Skip to Main Content
NM-Projects

Main Navigation

  • Home
  • Publications
  • Blog
  • About
  • Legal Disclosure
  • Privacy Policy

Category: Reverse Engineering

Investigation into DES cracking with John the Ripper and Ztex FPGA

By Matthias Niedermaier Posted on 2020-02-10 Posted in Embedded Security, IT-Security, Linux, Make, Reverse Engineering 6 Comments
Investigation into DES cracking with John the Ripper and Ztex FPGA

DES has not been considered safe for a long time. For some time now, cracking tool John the Ripp has even made it possible to accelerate cracking with FPGAs. Since I find this topic exciting, I tried it with an …

Investigation into DES cracking with John the Ripper and Ztex FPGA Read more »

First Impression on the Xiaomi WiFi+

By Matthias Niedermaier Posted on 2017-12-30 Posted in Embedded Security, Linux, Make, Reverse Engineering 1 Comment
First Impression on the Xiaomi WiFi+

Here a first look at the Xiaomi WiFi+ PCB and Software is given.

Analysis of Mini 3G/4G WiFi Wireless Router (A5-V11)

By Matthias Niedermaier Posted on 2017-09-13 Posted in Embedded Security, IT-Security, Linux, Raspberry Pi, Reverse Engineering 2 Comments
Analysis of Mini 3G/4G WiFi Wireless Router (A5-V11)

Hacking IP-Camera Digoo BB-M2 – Part 3 – Getting root access

By Matthias Niedermaier Posted on 2017-01-15 Posted in Embedded Security, IT-Security, Linux, Reverse Engineering 31 Comments

After getting access to the serial interface of the IP-Camera the next step is to get a root shell.

Hacking IP-Camera Digoo BB-M2 – Part 2 – Analyzing the boot process

By Matthias Niedermaier Posted on 2017-01-01 Posted in Embedded Security, IT-Security, Linux, Reverse Engineering 15 Comments
Hacking IP-Camera Digoo BB-M2 – Part 2 – Analyzing the boot process

The last article shows, how to identify the serial port on the IP-Camera. With this it is possible to solder wires on the IP-Camera and attach a USB to serial adapter to it.

Hacking IP-Camera Digoo BB-M2 – Part 1 – Identify serial interface

By Matthias Niedermaier Posted on 2016-12-28 Posted in Embedded Security, IT-Security, Linux, Reverse Engineering 4 Comments
Hacking IP-Camera Digoo BB-M2 – Part 1 – Identify serial interface

I have bought an WiFi security camera from banggood. The Digoo BB-M2 Mini WiFi HD 720P costs about 20 €, which is quite cheap for this kind of product. This article will analyze the serial interface of the IP camera.

Simple Binary Viewer

By Matthias Niedermaier Posted on 2016-02-01 Posted in Linux, Reverse Engineering No Comments

With this simple Python script it is possible to view a binary file in different styles. This is also possible for example with the Linux tool hexdump. Nevertheless it is sometimes necessary to have this code in an own tool. …

Simple Binary Viewer Read more »

Hacking TL-MR3020 – Part 4 – Qemu test

By Matthias Niedermaier Posted on 2016-01-15 Posted in Embedded Security, Linux, Reverse Engineering No Comments

Qemu with RootFS of TL-MR3020 This tutorial should show, how it is possible to set-up a Qemu virtualized environment. DRAFT!

Hacking TL-MR3020 – Part 3 – Firmware analysis

By Matthias Niedermaier Posted on 2016-01-15 Posted in Embedded Security, Linux, Reverse Engineering No Comments

Extracting and Analysis Firmware of the TL-MR3020 This tutorial shows how the firmware of the TP-Link TL-MR3020 could be analysed. DRAFT!  

Hacking TL-MR3020 – Part 2 – Firmware dump over SERIAL

By Matthias Niedermaier Posted on 2016-01-15 Posted in Embedded Security, Linux, Reverse Engineering No Comments

TL-MR3020 Serial Dump over Python Script This tutorial show, how it is possible to make a firmware dump of the TP-Link TL-MR3020 via a serial connection. DRAFT!

Hacking TL-MR3020 – Part 1 – Firmware dump over TFTP

By Matthias Niedermaier Posted on 2016-01-12 Posted in Embedded Security, Linux, Reverse Engineering 2 Comments

Firmware dump of the TP-Link TL-MR3020 This tutorial will show, how it is possible to make a firmware dump of the TP-Link TL-MR3020 Router. As a possible method the /dev/mtd* data will be transferred over tftp.

HackMe4 – Timing

By Matthias Niedermaier Posted on 2015-12-15 Posted in Linux, Reverse Engineering, Windows No Comments

HackMe4: This password crack should be hacked by timing analysis. A timing analysis is the time variation a program needs to check the password. Download File: HackMe4(Linux) Download File: HackMe4(Windows)

HackMe3 – Buffer overflow

By Matthias Niedermaier Posted on 2015-12-10 Posted in Linux, Reverse Engineering, Windows No Comments

HackMe3: This password crack should be hacked by buffer overflow. Download File: HackMe3(Linux) Download File: HackMe3(Windows)

HackMe2 – Dynamic analysis

By Matthias Niedermaier Posted on 2015-12-07 Posted in Linux, Reverse Engineering, Windows No Comments

HackMe2: This password uses a simple check-sum comparison for authorization. Download File: HackMe2(Linux) Download File: HackMe2(Windows)

Disassembler

By Matthias Niedermaier Posted on 2015-12-05 Posted in Linux, Reverse Engineering, Windows No Comments

With a disassembler it is possible to analyze binary files. There are a lot of different programs on the market for different platforms. A lot of them supports different architectures too. Some of them are listed bellow.

HackMe1 – Strings

By Matthias Niedermaier Posted on 2015-12-04 Posted in Linux, Reverse Engineering, Windows No Comments

HackMe1: This should be a very simple introduction about reverse engineering. The aim of this lab is to get access by getting the password out of the provided binary file. The source code in the solution is totally unusable for any …

HackMe1 – Strings Read more »

Footer Menu

  • Home
  • Publications
  • Blog
  • About
  • Legal Disclosure
  • Privacy Policy
© 2023 Matthias Niedermaier | Powered by Responsive Theme