IMCAFS

Home

know the hardware routing of the tool

Posted by barello at 2020-04-05
all

Introduction

In this sharing, the scope of knowledge points is a little wide and complex. There are four big knowledge points respectively. Besides, there are several small knowledge points under the four big knowledge points. However, all knowledge points are around wireless, router, hardware, which are needed or interested in wireless penetration and router security. You can have a look at them Share this. So far, hacker's learning has not been absolutely systematic. Most of it is with the accumulation of time and the expansion of skills. Therefore, knowledge points are miscellaneous. It's better to taste them as snacks. Secwiki is honored to be a "street vendor". Of course, more importantly, we are free. By the way, we also prepared an egg at the end of the last Android related sharing. Now, it's a surprise when you read it. Maybe it's not a big surprise for some big bulls, but for those who are just starting or need to learn Android penetration, they can really spend some time to study, don't believe it Just look at it.

Firmware analysis tool summary

Binwalk

firmware-mod-kit

Angr

Article address:

https://www.sec-wiki.com/topic/55

Hardware device vulnerability station

http://routerpwn.com/

Article address:

https://www.sec-wiki.com/topic/32

"32474;"281833;"

MiniPwner

dd-wrt

openwrt

wifipineapple

Pwnie Express

wifidog

FruityWifi.

Wi-fEye.

pwnpi

HyperWRT

[Music]

https://www.sec-wiki.com/topic/34

路由器漏洞汇总 Unicorn Router WB-3300NR CSRF (Factory Reset/DNS Change) Unicorn Router WB-3300NR CSRF (Factory Reset/DNS Change) D-Link Router 2760N (DSL-2760U-BN) Multiple XSS D-Link Router 2760N (DSL-2760U-BN) Multiple XSS Real-World CSRF attack hijacks DNS Server configuration of TP-Link routers Real-World CSRF attack hijacks DNS Server configuration of TP-Link routers TP-Link TL-WR740N / TL-WR740ND - 150M Wireless Lite N Router HTTP DoS TP-Link TL-WR740N / TL-WR740ND - 150M Wireless Lite N Router HTTP DoS TP-Link TD-8840t - CSRF Vulnerability TP-Link TD-8840t - CSRF Vulnerability D-Link DIR-XXX remote root access exploit. D-Link DIR-XXX remote root access exploit. Zine: D-Link DSR Router Series Zine: D-Link DSR Router Series D-Link DSL-2750U ME_1.09 - CSRF Vulnerability D-Link DSL-2750U ME_1.09 - CSRF Vulnerability D-Link DSL-2750B ADSL Router - CSRF Vulnerability D-Link DSL-2750B ADSL Router - CSRF Vulnerability 文章地址:

https://www.sec-wiki.com/topic/27

Egg

This egg is to send some Android learning related materials and tutorials to take care of some students who are getting started.

Android reverse cracking tutorial

Crack China Mobile Android game charges

mobeisecurity

Android cracking Trilogy

Article address:

https://www.sec-wiki.com/topic/26

Android安全相关书籍汇总 Android Apps Security Android Apps Security Android Security: Attacks and Defenses Android Security: Attacks and Defenses Android Forensics: Investigation, Analysis and Mobile Security for Google Android Android Forensics: Investigation, Analysis and Mobile Security for Google Android Decompiling Android Decompiling Android Mobile Application Security Mobile Application Security Android Application Security Essentials Android Application Security Essentials Application Security for the Android Platform: Processes, Permissions, and Other Safeguards Application Security for the Android Platform: Processes, Permissions, and Other Safeguards Hacking Exposed Mobile Security Secrets & Solutions Hacking Exposed Mobile Security Secrets & Solutions Android Hacker’s Handbook Android Hacker’s Handbook Mobile Phone Security and Forensics: A Practical Approach Mobile Phone Security and Forensics: A Practical Approach Embedded Java Security: Security for Mobile Devices Embedded Java Security: Security for Mobile Devices XDA Developers’ Android Hacker’s Toolkit XDA Developers’ Android Hacker’s Toolkit Android Malware Android Malware Mobile Malware Attacks and Defense Mobile Malware Attacks and Defense Ref:secmobi Ref:secmobi 文章地址:

https://www.sec-wiki.com/topic/43

Extra

In five years, we have accumulated many articles. Some articles in these articles are very classic and practical. For these articles, we will sort out some essays in the near future to popularize the SecWiki official account to readers, and if some readers feel incomplete, or want to add their own tools or postures, please welcome the comments below. Let this essays be kept in the article for the rest of the readers forever, and finally, we hope that interested readers will keep our official account of WeChat public.