Monitor is a BOT programmed to spider web pages and collect desired content. It was originally developed to find logins, email addresses, password hashes, shadow files, SQL dumps and generally, data leaked by users and developers, or disclosed by Hacktivist in the Internet. Monitor implements a serie of filters and a mechanisms to classify and categorise the parsed content, which is subsequently stored into a database for later access. This tool has been used to parse Pastebin, Anonpaste and Pastie web sites and the following is a demonstration of this utility.
After “rooting” an Android phone, I was attracted by the idea of installing supplementary binaries on the device. Usually after rooting the Android device, you will be finding Busybox installed. This application allows your Android phone to execute a list of common unix like commands such as ls, grep, ifconfig, awk etc… To retrieve the list of available command and the version of your Busybox just run Busybox without parameters from the command line:
At that time I was interested in monitoring the connection made by an application installed on the phone, so my target was to take Tcpdump onto the Android phone.
This post is a quick intro about the first concepts of reversing firmware. It is not a methodology that can be used to reverse any firmware due to the nature and the variety of devices and firmwares available, however the steps and the tools used in this post are a good starting point for who wants to learn more about this matter. In this article I will be reversing a few router firmware.
Reversing firmware can be fun but also very frustrating. There are firmware that can be easily reversed just by using the right tools at the right time, others in which you need to read lines of assembly code, some may come obfuscated and requires extra effort before being reversed.