Category: Reverse Engineering

Here a first look at the Xiaomi WiFi+ PCB and Software is given.

After getting access to the serial interface of the IP-Camera the next step is to get a root shell.

The last article shows, how to identify the serial port on the IP-Camera. With this it is possible to solder wires on the IP-Camera and attach a USB to serial adapter to it.

I have bought an WiFi security camera from banggood. The Digoo BB-M2 Mini WiFi HD 720P costs about 20 €, which is quite cheap for this kind of product. This article will analyze the serial interface of the IP camera.

With this simple Python script it is possible to view a binary file in different styles. This is also possible for example with the Linux tool hexdump. Nevertheless it is sometimes necessary to have this code in an own tool. …

Simple Binary Viewer Read More »

Qemu with RootFS of TL-MR3020 This tutorial should show, how it is possible to set-up a Qemu virtualized environment. DRAFT!

Extracting and Analysis Firmware of the TL-MR3020 This tutorial shows how the firmware of the TP-Link TL-MR3020 could be analysed. DRAFT!  

TL-MR3020 Serial Dump over Python Script This tutorial show, how it is possible to make a firmware dump of the TP-Link TL-MR3020 via a serial connection. DRAFT!

Firmware dump of the TP-Link TL-MR3020 This tutorial will show, how it is possible to make a firmware dump of the TP-Link TL-MR3020 Router. As a possible method the /dev/mtd* data will be transferred over tftp.

HackMe4: This password crack should be hacked by timing analysis. A timing analysis is the time variation a program needs to check the password. Download File: HackMe4(Linux) Download File: HackMe4(Windows)

HackMe3: This password crack should be hacked by buffer overflow. Download File: HackMe3(Linux) Download File: HackMe3(Windows)

HackMe2: This password uses a simple check-sum comparison for authorization. Download File: HackMe2(Linux) Download File: HackMe2(Windows)

With a disassembler it is possible to analyze binary files. There are a lot of different programs on the market for different platforms. A lot of them supports different architectures too. Some of them are listed bellow.

HackMe1: This should be a very simple introduction about reverse engineering. The aim of this lab is to get access by getting the password out of the provided binary file. The source code in the solution is totally unusable for any …

HackMe1 – Strings Read More »