Emulating and Exploiting Firmware binaries
Tags
attack-pattern: | Data Firmware - T1592.003 Hardware - T1592.001 Tool - T1588.002 Vulnerabilities - T1588.006 Sudo - T1169 |
Common Information
Type | Value |
---|---|
UUID | 2eca9852-1b71-4eb7-b893-ef7bad9a7adc |
Fingerprint | 27edd015012f13b0 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Aug. 16, 2016, midnight |
Added to db | Jan. 18, 2023, 8:14 p.m. |
Last updated | Nov. 17, 2024, 11:40 p.m. |
Headline | Emulating and Exploiting Firmware binaries |
Title | Emulating and Exploiting Firmware binaries |
Detected Hints/Tags/Attributes | 35/1/13 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | https://blog.attify.com/emulating-exploiting-firmware-binaries/ |
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 1 | homedash.org |
|
Details | Domain | 4128 | github.com |
|
Details | Domain | 3 | extract-firmware.sh |
|
Details | Domain | 1 | build-firmware.sh |
|
Details | Domain | 4 | attify.com |
|
Details | 4 | secure@attify.com |
||
Details | File | 1 | kkeps.bin |
|
Details | File | 5 | 3.bin |
|
Details | File | 18 | pattern_create.rb |
|
Details | File | 16 | pattern_offset.rb |
|
Details | Github username | 7 | praetorian-inc |
|
Details | Url | 1 | http://homedash.org/2014/09/21/firmware-downloads |
|
Details | Url | 1 | https://github.com/praetorian-inc/dvrf |