Skip to content
  • Main
  • Content
  • int21h
  • About

MOV AX, BX

Code depilation salon: Articles, Code samples, Processor code documentation, Low-level programming, Working with debuggers

  • Story Behind Sweet SSRF. Story Behind Sweet SSRF.
  • The Secret Parameter, LFR, and Potential RCE in NodeJS Apps The Secret Parameter, LFR, and Potential RCE in NodeJS Apps
  • Exploiting CVE-2014-3153 (Towelroot) Exploiting CVE-2014-3153 (Towelroot)
  • FreakOut! Ongoing Botnet Attack Exploiting Recent Linux Vulnerabilities FreakOut! Ongoing Botnet Attack Exploiting Recent Linux Vulnerabilities
  • NTFS Remote Code Execution (CVE-2020-17096) Analysis NTFS Remote Code Execution (CVE-2020-17096) Analysis

Метка: firmware

Debug UEFI code by single-stepping your Coffee Lake-S hardware CPU

Posted on 06.06.201906.06.2019 / by admin /

Debug UEFI code by single-stepping your Coffee Lake-S hardware CPU

Posted in debug, firmware, hardware, UEFI Tagged debug, firmware, hardware, uefi Leave a Comment on Debug UEFI code by single-stepping your Coffee Lake-S hardware CPU

Debugging UCSI firmware failures

Posted on 07.11.2018 / by admin /

( Original text by Rajib Dutta ) Background The UCSI driver in Windows communicates with the firmware UCSI component (called PPM or Platform

Read More

Posted in firmware, windows Tagged firmware, UCSI, UCSICX, Windows Leave a Comment on Debugging UCSI firmware failures

Insecure Firmware Updates in Server Management Systems

Posted on 07.11.2018 / by admin /

( Original text by Eclypsium ) Supermicro BMC Case Study Baseboard Management Controllers (BMCs) are high-value targets to attackers, who can use the

Read More

Posted in chip, eeprom, examples, firmware, security Tagged firmware, security Leave a Comment on Insecure Firmware Updates in Server Management Systems

Brief reverse engineering work on FIMI A3

Posted on 31.10.2018 / by admin /

( Original text by Konrad Iturbe ) This is the start of a new series on reverse engineering consumer products, mainly to enhance

Read More

Posted in Drone, examples, firmware, hacking, IoT, revers, reverse Tagged Drones, firmware, hacking, IoT, Reverse Engineering Leave a Comment on Brief reverse engineering work on FIMI A3

Reversing ESP8266 Firmware (Part 6)

Posted on 26.10.2018 / by admin /

( original text by @boredpentester ) At this point we’re actually reversing ESP8266 firmware to understand the functionality, specifically, we’d like to

Read More

Posted in eeprom, ida, revers, reverse Tagged ESP8266, firmware, ida, Reversing Leave a Comment on Reversing ESP8266 Firmware (Part 6)

Reversing ESP8266 Firmware (Part 5)

Posted on 26.10.2018 / by admin /

( original text by @boredpentester ) Recognising VTABLE’s After analysing our firmware image to some degree, it becomes clear that vtables are in use.

Read More

Posted in eeprom, ida, revers, reverse Tagged ESP8266, firmware, ida, Reversing Leave a Comment on Reversing ESP8266 Firmware (Part 5)

Reversing ESP8266 Firmware (Part 4)

Posted on 26.10.2018 / by admin /

( original text by @boredpentester ) Writing an IDA loader So, why a loader? The main reason was that I wanted something

Read More

Posted in eeprom, ida, revers, reverse Tagged ESP8266, firmware, ida, Reversing Leave a Comment on Reversing ESP8266 Firmware (Part 4)

Reversing ESP8266 Firmware (Part 3)

Posted on 26.10.2018 / by admin /

( original text by @boredpentester ) What is it? So, what is the ESP8266? Wikipedia describes it as follows: The ESP8266 is a low-cost

Read More

Posted in firmware, ida, revers, reverse Tagged ESP8266, firmware, ida, Reversing Leave a Comment on Reversing ESP8266 Firmware (Part 3)

Reversing ESP8266 Firmware (Part 2)

Posted on 26.10.2018 / by admin /

( original text by @boredpentester ) Initial analysis As with any unknown binary, our initial analysis will help to uncover any strings

Read More

Posted in eeprom, ida, revers, reverse Tagged ESP8266, firmware, ida, Reversing Leave a Comment on Reversing ESP8266 Firmware (Part 2)

Reversing ESP8266 Firmware (Part 1)

Posted on 26.10.2018 / by admin /

( original text by @boredpentester ) During my time with Cisco Portcullis, I wanted to learn more about reverse engineering embedded device firmware.

Read More

Posted in firmware, ida, revers, reverse Tagged ESP8266, firmware, ida, Reversing Leave a Comment on Reversing ESP8266 Firmware (Part 1)

Навигация по записям

Предыдущие записи

What is up

Articles by date

  • Январь 2021 (5)
  • Декабрь 2020 (4)
  • Ноябрь 2020 (19)
  • Октябрь 2020 (16)
  • Сентябрь 2020 (1)
  • Август 2020 (2)
  • Июль 2020 (3)
  • Июнь 2020 (3)
  • Май 2020 (6)
  • Февраль 2020 (2)
  • Январь 2020 (1)
  • Декабрь 2019 (6)
  • Октябрь 2019 (2)
  • Июнь 2019 (4)
  • Апрель 2019 (4)
  • Март 2019 (4)
  • Февраль 2019 (28)
  • Январь 2019 (5)
  • Декабрь 2018 (30)
  • Ноябрь 2018 (62)
  • Октябрь 2018 (44)
  • Сентябрь 2018 (12)
  • Июль 2018 (8)
  • Июнь 2018 (21)
  • Май 2018 (10)
  • Апрель 2018 (32)
  • Февраль 2018 (12)
  • Январь 2018 (7)
  • Январь 2017 (2)
  • Декабрь 2016 (44)

FRESH Articles

  • Story Behind Sweet SSRF. 25.01.2021
  • The Secret Parameter, LFR, and Potential RCE in NodeJS Apps 25.01.2021
  • Exploiting CVE-2014-3153 (Towelroot) 21.01.2021
  • FreakOut! Ongoing Botnet Attack Exploiting Recent Linux Vulnerabilities 20.01.2021
  • NTFS Remote Code Execution (CVE-2020-17096) Analysis 07.01.2021
  • Speeding up Linux disk encryption 27.12.2020
  • Oh, so you have an antivirus… name every bug 27.12.2020
  • Dumping LAPS Passwords from Linux 21.12.2020
  • How I hacked Facebook: Part One 13.12.2020
  • Threat Actor: Unkown 30.11.2020
  • Escalating XSS to Account Takeover 30.11.2020
  • Weaponizing XSS For Fun & Profit 30.11.2020
  • Burp Suite vs OWASP ZAP – a Comparison series 27.11.2020
  • Genetic Analysis of CryptoWall Ransomware 27.11.2020
  • Coldcard isolation bypass 27.11.2020
  • AMD laptops have a hidden 10-second performance delay. Here’s why 27.11.2020
  • Bcrypt password cracking extremely slow? Not if you are using hundreds of FPGAs! 24.11.2020
  • The Powerful HTTP Request Smuggling 24.11.2020
  • Deep Dive Into Nmap Scan Techniques 24.11.2020
  • Exploring the Exploitability of “Bad Neighbor”: The Recent ICMPv6 Vulnerability (CVE-2020-16898) 14.11.2020

Meta rss

  • Регистрация
  • Войти
  • Лента записей
  • Лента комментариев
  • WordPress.org

About us

twitter:
OxFemale
defconmoscow
2600ru
Sites:
Defcon Moscow
2600 Moscow

mov ax, bx
or ax, bx
ret

 

Our friends

Our friends
twitter:
DC7499
Moscow2600
Sites:
Defcon Moscow
2600 Moscow

Meta

  • Регистрация
  • Войти
  • Лента записей
  • Лента комментариев
  • WordPress.org
Powered by WordPress

All rights reserved © MOV AX, BX Music and Video Theme by Seos Themes