One click exploits, generators, tools, news, vulnerabilities, poc, alerts. Date. Category. Source. Title. Author. Date. Category. Source. Title. Author. 20.
Software. Centrifuge Dropbox. Centrifuge Dropbox automated vulnerability scanning for embedded devices. Tactical Network Solutions. Software. Router Security Features List. List of security features to look for in routers. Michael Horowitz 2. Hardware. The Shikra. The Shikra is a device that allows the user to interface (via USB) to a number of different low- level data interfaces such as: JTAG, SPI, I2. C, UART, GPIO. int. SEGGER Microcontroller is a full-range supplier of software, hardware and development tools for embedded systems (RTOS, IDE, debug probe, stacks). For MDK, additional software components and support for microcontroller devices is provided by software packs. DFP (Device Family Pack) indicates that a software pack. Hardware. Saleae Log Analizers. Saleae Log Analizers Saleae makes easy- to- use USB Logic Analyzers that can record both digital and analog, and decode protcols like SPI, I2. C, Serial, 1- Wire, CAN, Manchester, I2. S and more. Saleae. Hardware. Good. FETGood. FET is an Open- source JTAG adapter, loosely based upon the TI MSP4. FET UIF and EZ4. 30. U boards. The Good. FET has been inspired by Hack. ADay's Bus Pirate to become a universal serial bus interface. Travis Goodspeed. Hardware. J- Link / J- Trace. J- Link / J- Trace debug probes support all ARM 7/9/1. Cortex, Microchip PIC3. Renesas RX CPUs and are supported by all major IDEs such as Keil MDK- ARM, GDB- based IDEs and SEGGER Embedded Studio. Segger. 20. 15/1. One clickmeat. pisto. X2. 00. 0 - Remote Command Execution. Works via Web. RTC IP enumeration, Web. Socket host scanning, and external resource fingerprinting. Softwaredevttys. 0Sasquatch is a modified unsquashfs utility that attempts to support as many hacked- up vendor- specific Squash. FS implementations as possible. One clickwebsecurity. D- Link DAP- 1. 36. CSRF and information disclosure. Must. Live. 20. 14/0. One clickwebsecurity. D- Link DAP- 1. 36. XSS & CSRFMust. Live. 20. 15/0. 6/0. One clickexploit- db. D- Link DSL- 5. 26. B ADSL2+ AU. Remember to run in command line for full router support. Advisory Po. C8thbit. TP- Link W8. 96. 1DN v. C6 cookie. Koorosh Ghorbani. Analysis Po. C/dev/ttys. D- Link DAP- 1. 52. B, DAP- 1. 65. 0 rev. B, DIR- 8. 90. L, DIR- 8. L, DIR- 8. 65. L, DIR- 8. L rev. A, DIR- 8. L rev. B DIR- 8. 15 rev. B, DIR- 3. 00 rev. B, DIR- 6. 00 rev. B, DIR- 6. 45, TEW- 7. DR, TEW- 7. 33. GR HNAP SOAPAction- Header Command Execution. Craig Heffner. 20. Metasploit module. Rapid. 7D- Link DAP- 1. B, DAP- 1. 65. 0 rev. B, DIR- 8. 80. L, DIR- 8. L, DIR- 8. 60. L rev. A, DIR- 8. 60. L rev. B DIR- 8. 15 rev. B, DIR- 3. 00 rev. B, DIR- 6. 00 rev. B, DIR- 6. 45, TEW- 7. DR, TEW- 7. 33. GR HNAP SOAPAction- Header Command Execution. Samuel Huntley, Craig Heffner, Michael Messner. Advisory Po. CD- Link. D- Link DIR- 6. 45 FW 1. Command Injection. Samuel Huntley. 20. Analysis Po. CShadow- file. Net. Gear. D- Link wndr. Command Injection. Zach Cutlip. 20. 15/0. Analysis Po. CKernelpicnic. Net. Gear SOAPWNDR Authentication Bypass. Peter Adkins. 20. Advisory Po. CKernelpicnic. TRENDnet Multiple vulnerabilities in D- Link and TRENDnet 'ncc. Peter Adkins. 20. Advisory Po. CKernelpicnic. D- Link Multiple vulnerabilities in D- Link and TRENDnet 'ncc. Peter Adkins. 20. One click. Kernelpicnic. D- Link DSP- W1. 10 (Rev A) v. Information Disclosure WLAN SSID, MAC, Versions. Peter Adkins. 20. Advisory Po. CKernelpicnic. D- Link DSP- W1. 10 (Rev A) v. Arbitrary command execution / SQL Injection / file upload. Peter Adkins. 20. One click. Daniel Cisa. ZTE F6. 60 V2. 2. Authentication Bypass Download config . Inspired by the Little Black Box project, but focused primarily on SSH (as opposed SSL) keys. Currently has Array Networks, Ceragon Fibeair, F5 Big. IP, loadbalancer. Advisory. SEC Consult. D- Link DIR- 6. 15 C Net. USB Kernel Stack Buffer Overflow. SEC Consult Vulnerability Lab. Advisory. SEC Consult. TP- LINK Net. USB Archer C2 V1. C5 V2. 0 C7 V2. 0 C8 C9 D2 D5 D7 D7. B D9 VR2. 00 TC- VG3. XXX TC- W1. XXX TD- W8. XXX TD- W9. XXX TL- WRXXXX TX- VG1. SEC Consult Vulnerability Lab. Advisory. SEC Consult. TRENDnet Net. USB TE1. MFP1 TEW- 6. XXXXX TEW- 8. XXXXX TEW- MFP1. SEC Consult Vulnerability Lab. Advisory. SEC Consult. Netgear Net. USB AC1. D6. X0. 0 DC1. 12. A DGND4. 00. 0 EX6. EX7. 00. 0 JNR3. XXX JR6. XXX PR2. 00. 0 R6. XXX R7. XXX WN3. XXXXX WNDR4. XXX XAU2. 51. 1. SEC Consult Vulnerability Lab. Advisory. Full Disclosure. Observa- Telecom VH4.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
August 2017
Categories |