OWASP FSTM, etapa 4: Extracción del sistema de ficheros
Common Information
Type Value
UUID b93bb470-a1c0-4888-a603-2250e52ef2ba
Fingerprint bf7fd018acac8bb0
Analysis status DONE
Considered CTI value 0
Text language
Published Sept. 26, 2022, midnight
Added to db Dec. 20, 2024, 5:10 a.m.
Last updated Dec. 26, 2024, 12:14 a.m.
Headline OWASP FSTM, etapa 4: Extracción del sistema de ficheros
Title OWASP FSTM, etapa 4: Extracción del sistema de ficheros
Detected Hints/Tags/Attributes 36/1/19
Attributes
Details Type #Events CTI Value
Details Domain 4725
github.com
Details Domain 58
www.kali.org
Details Domain 15
www.pentestpartners.com
Details Domain 4
blog.k3170makan.com
Details File 4
hola.txt
Details File 13
firmware.bin
Details File 3
bootcode.bin
Details File 6
cmdline.txt
Details File 42
config.txt
Details File 2
fixup_cd.dat
Details File 2
fixup.dat
Details File 2
reverse-engineering-primer-unpacking.html
Details Github username 8
scriptingxss
Details Github username 20
owasp
Details Url 8
https://github.com/scriptingxss/owasp-fstm
Details Url 2
https://www.kali.org/tools/firmware-mod-kit
Details Url 4
https://github.com/owasp/iotgoat
Details Url 2
https://www.pentestpartners.com/security-blog/how-to-do-firmware-analysis-tools-tips-and-tricks
Details Url 2
https://blog.k3170makan.com/2018/06/reverse-engineering-primer-unpacking.html