Penetration Testing mailing list archives
Re: "hacking" a wireless ap firmware
From: "David M. Zendzian" <dmz () dmzs com>
Date: Fri, 07 Jul 2006 08:57:07 -0700
Maybe you should check out the many tiny flash systems for APs out there and see how they build their ".bin" to be able to reverse engineer how someone else's build is.
Although why reengineer a firmware, why not just reflash the device with your own firmware, much quicker/easier and most likely won't be noticed if you have that kind of access...
Just google "linux linksys" and start there. david Norbert François wrote:
Hi everybody... After a discussion with a friend of mine, I argued that it was possible to change the behaviour of a firmware, so that an attacker could put a backdoor inside, for instance :S... Perhaps I spoke a bit quickly, 'cause now I feel a bit lost in modifying the firmware :(. Basically, every access point proposes you to update its firmware... Most of the fime, these firmware are sold in a *.bin format. After having tried to search for relevant strings in the bin, disassembling it and loosing time, I'm still at the same point :(. Do you have any experience in firmware modification ? Do you know in which language firwares are written ? Maybe tryin' a decompilation could help me... Thanks a lot Norbert------------------------------------------------------------------------------This List Sponsored by: CenzicConcerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------------
------------------------------------------------------------------------------ This List Sponsored by: CenzicConcerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------
Current thread:
- "hacking" a wireless ap firmware Norbert François (Jul 07)
- Re: "hacking" a wireless ap firmware Michael Puchol (Jul 07)
- Re: "hacking" a wireless ap firmware Rogan Dawes (Jul 07)
- Re: "hacking" a wireless ap firmware David M. Zendzian (Jul 07)
- Re: "hacking" a wireless ap firmware Jorge Augusto Senger (Jul 07)
- Re: "hacking" a wireless ap firmware Franck Veysset (Jul 10)
- Re: "hacking" a wireless ap firmware haad (Jul 14)