Auditing system calls for command injection vulnerabilities using Ghidra's PCode

Ғылым және технология

Flashback Team: How We Hacked a TP-Link Router and Took Home $55,000 in Pwn2Own
• How We Hacked a TP-Lin...
Exploiting the TP-Link Archer A7 at Pwn2Own Tokyo
www.thezdi.com/blog/2020/4/6/...
Get the code from this video here:
gist.github.com/cetfor/807c50...

Пікірлер: 4

  • @FlashbackTeam
    @FlashbackTeam3 жыл бұрын

    Hey! Thanks for doing this video. This is an awesome script, and it's much more complex than ours. Ours simply decompiles all the functions and then greps them. But yours has much more potential!

  • @HackOvert

    @HackOvert

    3 жыл бұрын

    OK, aaannnd looks like my print out of your comment is complete. Be right back... It's now hanging on my refrigerator for everyone to see! Thanks! :D

  • @vishwarajbhattrai67
    @vishwarajbhattrai673 күн бұрын

    That's cool thanks for making the tutorial this is something I am trying to do with IDA python I am able to find vulnerable points but also wanted to find the input which will trigger that specific vulnerable code do you have any experience with symbolic execution framework like angr if yes could you please make one video on that like to find the particular input which will trigger the vulnerable code ?

  • @josh9761
    @josh97613 жыл бұрын

    Great video keep it up!

Келесі