poniedziałek, 31 grudnia 2018

Reading firmware - Foscam

Few months ago - as you probably remember - I started section related to 'reading firmwares'. Few results from the journey you have already published on the blog (for example: 1, 2, 3). In September I found another firmware, this time related to Foscam and this is what I found inside...

niedziela, 30 grudnia 2018

sobota, 29 grudnia 2018

Sedna CTF

After the last VM I decided to check another one - this time prepared by Viper, called Sedna. More details you will find here shared thanks to the VulnHub. Here we go...

środa, 26 grudnia 2018

Crashing VLC 3.0.4

This time I decided to prepare a quick fuzzing case(s) for latest VLC - (version 3.0.4 for  24.12.2018@01:24). Below you will find few details...

wtorek, 25 grudnia 2018

Crashing CANOpen Builder

Last time we talked about few bugs found in ISPSoft and DCISoft. Today we will check the crash for CANOpen Builder by Delta Electronics. Here we go...

Crashing FantaMorph

Last time during the fuzzing we were able to crash DCISoft. This time we will check few bugs found for FantaMorph 5.4.8. Here we go...

poniedziałek, 24 grudnia 2018

Reading firmware - Fortigate VM

Our mini-lab is prepared so we can try another 'firmware'. This time, somewhere on Google, I found "Fortigate's VM" called "FGT_VM64_VMX-v5". Let's see what's inside it...

Crashing DCISoft

Last time we talked about crashed ISPSoft. This time I decided to publish few crashes for DCISoft available at Delta Electronics web page. Below you'll find few details...

Pentesting AD - we the user

Last time we enumerated enough to be 'the user', so today we will start from this point: we are the user - logged in. Here we go...

środa, 19 grudnia 2018

Crashing ISPSoft

Few days ago I decided to fuzz a little bit one software available at Delta Electronics web page. This software is called ISPSoft and you can find it here. Below few quick results...

niedziela, 9 grudnia 2018

Pentesting AD - enumeration

Last time we prepared some small "AD environment". This time we'll try to 'enumerate AD' to get some useful information about the target. Here we go...