This blog post has been created for completing the requirements of the SecurityTube Offensive Internet of Things course. http://www.securitytube-training.com/online-courses/offensive-internet-of-things- exploitation/index.html Student ID: IoTE-728 In my previous post I connected to the serial port of a Netgear WNR1000 v4 router. I decided to do the same on a TP-Link WR841n v11 router. Here are the identified pins:…
Offensive IoT Exploitation Exam – Serial port of Netgear WNR1000 v4
This blog post has been created for completing the requirements of the SecurityTube Offensive Internet of Things course. http://www.securitytube-training.com/online-courses/offensive-internet-of-things- exploitation/index.html Student ID: IoTE-728 I decided to apply what I had learned during the Offensive IoT Exploitation course and connected to the serial port of my Netgear WNR1000 v4 router with an FT232BL Serial-USB converter. Connecting…
Offensive IoT Exploitation Exam – Examine mydlink web camera firmware with binwalk
This blog post has been created for completing the requirements of the SecurityTube Offensive Internet of Things course. http://www.securitytube-training.com/online-courses/offensive-internet-of-things- exploitation/index.html Student ID: IoTE-728 I bought and examined a MyDLink web camera (DCS-930L, hardware version: B1). The firmware (v2.14) can be downloaded from here. The firmware release notes can be found here. I started the…
- This blog is dedicated to my research and experimentation on ethical hacking. The methods and techniques published on this site should not be used to do illegal things. I do not take responsibility for acts of other people.
-
Recent Posts
Categories
- Android (5)
- Fusion (2)
- IoT (13)
- Main (3)
- Mobile (6)
- Protostar (24)
- SLAE32 (8)
- VulnServer (6)
- Windows Reverse Shell (2)