Firmware exploitation with JEB: Part 2
This is the second blog post of our series on MIPS exploitation using Praetorian’s Damn Vulnerable Router Firmware (DVRF) written by b1ack0wl. In the first part we exploited a (not so simple) stack buffer overflow, using our JEB ROP gadget finder. Let’s dig into the second and third buffer overflow challenges! Stack_bof_02 Recon As the … Continue reading Firmware exploitation with JEB: Part 2
Copy and paste this URL into your WordPress site to embed
Copy and paste this code into your site to embed