OWASP FSTM, stage 4: Extracting the filesystem
Common Information
Type Value
UUID bfbe4d9b-0c4c-49ef-a034-c7b1f5d058d9
Fingerprint a59f581a48a58788
Analysis status DONE
Considered CTI value 0
Text language
Published Sept. 26, 2022, midnight
Added to db Dec. 20, 2024, 5:43 a.m.
Last updated Dec. 26, 2024, 12:14 a.m.
Headline OWASP FSTM, stage 4: Extracting the filesystem
Title OWASP FSTM, stage 4: Extracting the filesystem
Detected Hints/Tags/Attributes 52/1/19
Attributes
Details Type #Events CTI Value
Details Domain 4725
github.com
Details Domain 58
www.kali.org
Details Domain 15
www.pentestpartners.com
Details Domain 4
blog.k3170makan.com
Details File 4
hola.txt
Details File 13
firmware.bin
Details File 3
bootcode.bin
Details File 6
cmdline.txt
Details File 42
config.txt
Details File 2
fixup_cd.dat
Details File 2
fixup.dat
Details File 2
reverse-engineering-primer-unpacking.html
Details Github username 8
scriptingxss
Details Github username 20
owasp
Details Url 8
https://github.com/scriptingxss/owasp-fstm
Details Url 2
https://www.kali.org/tools/firmware-mod-kit
Details Url 4
https://github.com/owasp/iotgoat
Details Url 2
https://www.pentestpartners.com/security-blog/how-to-do-firmware-analysis-tools-tips-and-tricks
Details Url 2
https://blog.k3170makan.com/2018/06/reverse-engineering-primer-unpacking.html