Aerosol Posted May 4, 2015 Report Posted May 4, 2015 Developing MIPS Exploits to Hack Routers 11. INTRODUCTION 32. PREPARING LAB 32.1. Running Debian MIPS on QEMU 32.2. Cross Compiling for MIPS (bonus section) 43. REVERSE ENGINEERING THE BINARY 53.1. Obtaining The Target Binary 53.2. Getting The Target Running 63.3. Setting Up Remote Debugging 83.4. Analysing The Vulnerability 94. WRITING THE EXPLOIT 104.1. Restrictions and Solutions 104.2. Finding a Proper ROP Chain 114.2. MIPS Shellcoding 144.2.1 Writing Fork Shellcode 144.2.1 Writing Unlink Shellcode (bonus section) 165. CONCLUSION 186. References 19 Read more: https://www.exploit-db.com/docs/36806.pdf Quote