Skip to main content

Questions tagged [linux]

A free and open source POSIX compatible operating system with a monolithic kernel and a kernel module system. Originally created by Linus Torvalds.

1 vote
0 answers
39 views

I can't access the admin page in my router, is there a way to install a new firmware? router model : ZTE ZXHM F6600P

I wanted to turn my router into an AP, but apparently the option to activate it has been locked by my ISP, since I can't access the 192.168.0.1 page, I can only log in 192.168.11.1 as a user. After I ...
hamza br's user avatar
0 votes
1 answer
57 views

New processor not showing up in Ghidra on macOS

I added a new processor to Ghidra and it's showing up on Linux but not on macOS. Any suggestions? I filed this issue just in case.
Joel Reymont's user avatar
0 votes
1 answer
82 views

Ghidra user scripts location

Ghidra: what is default location (path) for custom scripts? Same question for custom .fidb files.
minto's user avatar
  • 235
0 votes
0 answers
34 views

Changing running kernel thread code from another LKM (ARM linux 4.19.130)

I am security testing an embedded ARM linux 4.19.130 IoT device - without kernel source code or ability to change the kernel due to signing. I have managed to get a root shell. However, by the time ...
user46754's user avatar
1 vote
1 answer
90 views

How to extract 7z archive with LZMA compression

I have firmware file, which contains a raw MIPS32 binary code. I used binwalk to scan for signatures binwalk -B -t image.out and for executable opcodes binwalk -A -t image.out Top part of the output: ...
minto's user avatar
  • 235
2 votes
1 answer
48 views

IDA Remote Debugging and automatically interaction with the process

I am learning IDA and currently working with the debugger. In particular, I want to automate the interaction with my remote binary (from Windows Subsystem Linux - Ubuntu 22.04 instance), like what I ...
Anh Nguyễn Tuấn's user avatar
3 votes
0 answers
97 views

gain root access to my camera monitor

Edit: I managed to dump the firmware and obtained the root password hash, but there are two hashes. I successfully cracked one, resulting in helpme, but the other one might take a while. However, user:...
NotRin's user avatar
  • 31
0 votes
0 answers
42 views

NxP3143 Uboot encrypted image and roots help

I have an encrypted firmware based on 2 files uImage (kernel) and rootfs (filesystem) and I have got the encryption keys from someone who cracked it. However I don’t know where to start so I can mount ...
Armandooooo's user avatar
0 votes
1 answer
220 views

S30+ Game Development

How can I get started developing games for the S30+ operating system on Windows or Linux? I have a new nokia 150, which seems to run the correct operating system, although I'm not sure if this phone ...
Kynemix's user avatar
0 votes
1 answer
64 views

how to print non printable address using python

i have been doin ctf challenge and came across a problem when i have to push the address of a function into eip{instruction pointer} by overflowing the buffer but the main problem here is that the ...
Zishan Ansari's user avatar
1 vote
0 answers
143 views

Help Extracting a CramFS filesystem from .img binary

I'm trying to extract a CramFS filesystem from a firmware binary for the FVS318Gv2. It downloads as a .zip file that can be decompressed to reveal a firmware .img file and a readme.htm. Running ...
cdbrunow's user avatar
0 votes
0 answers
69 views

Decompile or analyse injected /usr/bin/cat

I'm trying to decompile or analyse an injected Linux executable binary file /usr/bin/cat ,and find the injected code as a readable. Need some tips as a beginner how to find the injection method if it'...
Dany Burgos's user avatar
0 votes
1 answer
162 views

Router shadow password generation

I'm reverse engineering a router, I'm fairly new to embedded devices and how Linux boots up, but I have a root UART shell, there's already a password hash in the /etc/shadow file, these passwords/...
spergy's user avatar
  • 1
1 vote
1 answer
99 views

What to do when the .img is corrupted?

After getting rejected from a promising interview process with Company A, the interviewer reached out to me and provided me with Reverse Engineering challenges Company A provides publicly to work on. ...
Robert Gates's user avatar
2 votes
1 answer
106 views

Unix system with windows-style registry

When trying to determine the filesystem of a firmware image using binwalk, I encountered a strange combination. The binwalk is returning a lot of Unix paths, but some of them contain a typical windows-...
Suske Lambik's user avatar

15 30 50 per page
1
2 3 4 5
24