Questions tagged [linux]
A free and open source POSIX compatible operating system with a monolithic kernel and a kernel module system. Originally created by Linus Torvalds.
351
questions
0
votes
0
answers
12
views
Changing running kernel thread code from another LKM (ARM linux 4.19.130)
I am security testing an embedded ARM linux 4.19.130 IoT device - without kernel source code or ability to change the kernel due to signing.
I have managed to get a root shell.
However, by the time ...
0
votes
1
answer
30
views
How to extract 7z archive with LZMA compression
I have firmware file, which contains a raw MIPS32 binary code.
I used binwalk to scan for signatures binwalk -B -t image.out and for executable opcodes binwalk -A -t image.out
Top part of the output:
...
2
votes
1
answer
40
views
IDA Remote Debugging and automatically interaction with the process
I am learning IDA and currently working with the debugger. In particular, I want to automate the interaction with my remote binary (from Windows Subsystem Linux - Ubuntu 22.04 instance), like what I ...
3
votes
0
answers
82
views
gain root access to my camera monitor
Edit: I managed to dump the firmware and obtained the root password hash, but there are two hashes. I successfully cracked one, resulting in helpme, but the other one might take a while. However, user:...
0
votes
0
answers
39
views
NxP3143 Uboot encrypted image and roots help
I have an encrypted firmware based on 2 files uImage (kernel) and rootfs (filesystem) and I have got the encryption keys from someone who cracked it. However I don’t know where to start so I can mount ...
0
votes
0
answers
59
views
Improving the output of pseudocode C++ code from IDA Pro
I have some specific questions and some general ones about reverse-engineering a dynamic shared library via IDA Pro 8.3:
If I know the compiler used and compiler flags used (via readelf --debug-dump),...
0
votes
1
answer
137
views
S30+ Game Development
How can I get started developing games for the S30+ operating system on Windows or Linux?
I have a new nokia 150, which seems to run the correct operating system, although I'm not sure if this phone ...
0
votes
1
answer
58
views
how to print non printable address using python
i have been doin ctf challenge and came across a problem when i have to push the address of a function into eip{instruction pointer} by overflowing the buffer but the main problem here is that the ...
0
votes
0
answers
89
views
Help Extracting a CramFS filesystem from .img binary
I'm trying to extract a CramFS filesystem from a firmware binary for the FVS318Gv2. It downloads as a .zip file that can be decompressed to reveal a firmware .img file and a readme.htm. Running ...
0
votes
0
answers
66
views
Decompile or analyse injected /usr/bin/cat
I'm trying to decompile or analyse an injected Linux executable binary file /usr/bin/cat ,and find the injected code as a readable.
Need some tips as a beginner how to find the injection method if it'...
0
votes
1
answer
117
views
Router shadow password generation
I'm reverse engineering a router, I'm fairly new to embedded devices and how Linux boots up, but I have a root UART shell, there's already a password hash in the /etc/shadow file, these passwords/...
1
vote
1
answer
90
views
What to do when the .img is corrupted?
After getting rejected from a promising interview process with Company A, the interviewer reached out to me and provided me with Reverse Engineering challenges Company A provides publicly to work on.
...
0
votes
0
answers
82
views
Find offset to parameter not listed in objdump in vmlinux (which contains debug symbols)
I have a series of address offsets for ubuntu that are used in a custom toolset. I'd like to build a set of offsets for another kernel, but I can't find some ubuntu offset addresses in the debug ...
2
votes
1
answer
102
views
Unix system with windows-style registry
When trying to determine the filesystem of a firmware image using binwalk, I encountered a strange combination.
The binwalk is returning a lot of Unix paths, but some of them contain a typical windows-...
0
votes
1
answer
72
views
Updating legacy library in an already compiled binary
I'm dealing with a reverse engineering challenge involving a binary application that was statically compiled with a legacy library. While the legacy library is not vulnerable, it lacks certain ...