OWASP FSTM, stage 4: Extracting the filesystem
Tags
attack-pattern: | Data Firmware - T1592.003 Software - T1592.002 Tool - T1588.002 Vulnerabilities - T1588.006 Sudo - T1169 |
Common Information
Type | Value |
---|---|
UUID | bfbe4d9b-0c4c-49ef-a034-c7b1f5d058d9 |
Fingerprint | a59f581a48a58788 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Sept. 26, 2022, midnight |
Added to db | Dec. 20, 2024, 5:43 a.m. |
Last updated | Dec. 26, 2024, 12:14 a.m. |
Headline | OWASP FSTM, stage 4: Extracting the filesystem |
Title | OWASP FSTM, stage 4: Extracting the filesystem |
Detected Hints/Tags/Attributes | 52/1/19 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 4725 | github.com |
|
Details | Domain | 58 | www.kali.org |
|
Details | Domain | 15 | www.pentestpartners.com |
|
Details | Domain | 4 | blog.k3170makan.com |
|
Details | File | 4 | hola.txt |
|
Details | File | 13 | firmware.bin |
|
Details | File | 3 | bootcode.bin |
|
Details | File | 6 | cmdline.txt |
|
Details | File | 42 | config.txt |
|
Details | File | 2 | fixup_cd.dat |
|
Details | File | 2 | fixup.dat |
|
Details | File | 2 | reverse-engineering-primer-unpacking.html |
|
Details | Github username | 8 | scriptingxss |
|
Details | Github username | 20 | owasp |
|
Details | Url | 8 | https://github.com/scriptingxss/owasp-fstm |
|
Details | Url | 2 | https://www.kali.org/tools/firmware-mod-kit |
|
Details | Url | 4 | https://github.com/owasp/iotgoat |
|
Details | Url | 2 | https://www.pentestpartners.com/security-blog/how-to-do-firmware-analysis-tools-tips-and-tricks |
|
Details | Url | 2 | https://blog.k3170makan.com/2018/06/reverse-engineering-primer-unpacking.html |