破解完光猫不过隐,继续琢磨,查了些智能设备安全的教程,分析智能设备或嵌入式设备安全,第一步是要提取固件,所以接下来要提取固件了。
通过/proc虚拟文件系统读取MTD分区表:
/ # cat /proc/mtd
dev: size erasesize name
mtd0: 08000000 00020000 "whole flash"
mtd1: 00200000 00020000 "u-boot"
| #!/bin/bash | |
| # put policy.json to location secretsManager/policy.json | |
| # Create inline policy directly on the role | |
| aws iam put-role-policy \ | |
| --role-name $ROLE_NAME \ | |
| --policy-name SecretsManagerAccess \ | |
| --policy-document file://secretsManager/policy.json | |
| # Extract values from your JSON file |
| 发动机型号: 2.4升DOHC非涡轮增压发动机 | |
| 总长:4,265毫米(167.9英寸)ET 除外,4,280毫米(168.5英寸)适用于 ET | |
| 总宽:1,775毫米(69.9英寸) | |
| 整体高度(在C.W.):1,310毫米(51.6英寸) | |
| 轴距:2,575毫米(101.4英寸) | |
| 前轮距:1,520毫米(59.8英寸) | |
| 后轮距:1,550毫米(61.0英寸) | |
| 最小路面间隙:130毫米(5.1英寸) | |
| 发动机气缸排列:横置、水冷、四缸四冲程汽油发动机 | |
| 发动机气门系统机构:链条驱动、双顶置凸轮轴、4气门/缸 |
| { | |
| "technologies": { | |
| "1C-Bitrix": { | |
| "cats": [ | |
| "1", | |
| "6" | |
| ], | |
| "category_names": null, | |
| "cookies": { | |
| "BITRIX_SM_GUEST_ID": "", |
| #!/usr/bin/env python3 | |
| import sys | |
| import signal | |
| from threading import Thread | |
| from http.server import HTTPServer, BaseHTTPRequestHandler | |
| #!/usr/bin/env python3 | |
| import sys | |
| if not sys.stdin.isatty(): | |
| stdin = sys.stdin.read().splitlines() | |
| gnmap = stdin | |
| elif len(sys.argv) > 1: | |
| target = sys.argv[1] | |
| with open(GNMAP) as f: |
| . | |
| .. | |
| ........ | |
| @ | |
| * | |
| *.* | |
| *.*.* | |
| 🎠|
| <%@ Page Language="VB" Debug="true" %> | |
| <%@ import Namespace="system.IO" %> | |
| <%@ import Namespace="System.Diagnostics" %> | |
| <script runat="server"> | |
| Sub RunCmd(Src As Object, E As EventArgs) | |
| Dim myProcess As New Process() | |
| Dim myProcessStartInfo As New ProcessStartInfo(xpath.text) | |
| myProcessStartInfo.UseShellExecute = false |
| #!/bin/bash | |
| NOCOLOR='\033[0m' | |
| RED='\033[0;31m' | |
| GREEN='\033[0;32m' | |
| ORANGE='\033[0;33m' | |
| BLUE='\033[0;34m' | |
| PURPLE='\033[0;35m' | |
| CYAN='\033[0;36m' | |
| LIGHTGRAY='\033[0;37m' |
| #!/usr/bin/python3 | |
| from cmd import Cmd | |
| import requests | |
| import readline | |
| import sys | |
| from base64 import b64encode | |
| from random import randrange | |
| import threading | |
| from time import sleep |
破解完光猫不过隐,继续琢磨,查了些智能设备安全的教程,分析智能设备或嵌入式设备安全,第一步是要提取固件,所以接下来要提取固件了。
通过/proc虚拟文件系统读取MTD分区表:
/ # cat /proc/mtd
dev: size erasesize name
mtd0: 08000000 00020000 "whole flash"
mtd1: 00200000 00020000 "u-boot"