In this post, I show you how to decrypt the configuration file for a very popular PROLiNK ADSL router modem. This revealed an undocumented backdoor account with elevated privileges and other interesting configuration options and settings.
|
||
In this post, I show you how to decrypt the configuration file for a very popular PROLiNK ADSL router modem. This revealed an undocumented backdoor account with elevated privileges and other interesting configuration options and settings. This post is about the Green Screen of Death (GSOD) in Windows 10 Insider builds.. This post discusses the UEFI 2.4 Random Number Generator protocol and Lenovo’s current implementation of the protocol and suggests there is an error in their implementation. This blog contains the source code for my UDK2015 port of the ThinkPwn Oday proof of concept demonstration. This post explores the ftrace kernel tracing facility which has been available in the Linux kernel since early 2009. It also discusses the trace-cmd CLI frontend to ftrace and the kernelshark GUI for displaying and filtering the data generated by ftrace. |
||
Copyright © 2007-2024 Finnbarr P. Murphy. All Rights Reserved |