Fuzzing closed source IoT firmware binaries with AFL++ in Qemu mode. Fuzzing networked apps often requires desocketing and patching the binary.
https://blog.attify.com/fuzzing-iot-binaries-with-afl-part-ii/
Fuzzing closed source IoT firmware binaries with AFL++ in Qemu mode. Fuzzing networked apps often requires desocketing and patching the binary.
Learn step-by-step how to exploit Bootloaders using Practical attack vectors. Gain root access by loading custom kernel and filesystem using TFTP.
https://blog.attify.com/to-boot-or-not-to-boot-practical-attack-vector/
INTRODUCTION In this post, we will be describing the bootloader that goes by the name of Das U-Boot. We will delve into the following Das U-Boot features, including: - Das U-Boot Origin Story ...
A bootloader is simply the part of the system that is used at start-up to assist in the process of successfully starting the system and loading the operating system kernel. Read more.
Analyzing firmware binaries is often different from analyzing a PE or ELF file which have a definite structure. Reverse engineering firmware binaries often entails going through the datasheet, co...
https://blog.attify.com/analyzing-bare-metal-firmware-binaries-in-ghidra/
Flare-On 6 CTF WriteUp : help
Flare-On 6 CTF WriteUp : vv_max
Flare-On 6 CTF WriteUp : Mugatu
Flare-On 6 CTF WriteUp : reloaderd
Flare-On 6 CTF WriteUp : snake
Flare-On 6 CTF WriteUp : wopr
Flare-On 6 CTF WriteUp: bmphide
Flare-On 6 CTF WriteUp : Demo
Flare-On 6 CTF WriteUp: Dnschess