30% Off Embedded Exploitation Classes – /dev/ttyS0
In honor of all the good fun we’ve had at Linksys’ expense, students can use the promotional code LINKSYS to get a 30% discount off our Embedded Device Exploitation course on March 10th!
In honor of all the good fun we’ve had at Linksys’ expense, students can use the promotional code LINKSYS to get a 30% discount off our Embedded Device Exploitation course on March 10th!
With a good firmware disassembly and JTAG debug access to the WRT120N, it’s time to start examining the code for more interesting bugs. As we’ve seen previously, the WRT120N runs a Real Time Operating System. For security, the RTOS’s administrative web interface employs HTTP Basic authentication: 401 Unauthorized Most of… Continue reading
Our next Embedded Device Exploitation class will be held March 10-14th, 2014 in Columbia, MD. Registration is now open!
Perusing the release notes for the latest Linksys WRT120N firmware, one of the more interesting comments reads: Firmware 1.0.07 (Build 01) – Encrypts the configuration file. Having previously reversed their firmware obfuscation and patched their code to re-enable JTAG debugging, I thought that surely I would be able to use… Continue reading
After de-obfuscating the WRT120N’s firmware, I started taking a closer look at the code, which runs the now-defunct SuperTask! RTOS. Thanks in no small part to copious debug strings littered throughout the code and some leaked Atheros datasheets, I made good progress in statically disassembling the code. The next step… Continue reading
It was recently brought to my attention that the firmware updates for the Linksys WRT120N were employing some unknown obfuscation. I thought this sounded interesting and decided to take a look. The latest firmware update for the WRT120N didn’t give me much to work with: Binwalk firmware update analysis As… Continue reading