binreaper
  • Menu ▾
    • About
    • Posts
    • Tags
  • About
  • Posts
  • Tags

Born Insecure: What Firmware Analysis Reveals About IoT Security Debt

2026-03-13
#iot  #firmware  #mqtt  #security-research  #embedded  #reverse-engineering  #ghidra 

I analyzed seven firmware images from a major IoT camera vendor and found shared private keys, plaintext cloud protocols, and a command injection chain — all baked into the architecture from day one. This isn’t an end-of-life problem. It’s a design problem.

[]

HTB CCTV — ZoneMinder SQLi to Root via motionEye Signed API Command Injection

2026-03-09
#htb  #hackthebox  #ctf  #CVE-2024-51482  #zoneminder  #sqli  #motioneye  #command-injection  #cctv  #iot  #bcrypt  #hmac 

Walkthrough of HackTheBox CCTV machine — from ZoneMinder default credentials and CVE-2024-51482 blind SQLi to root via motionEye’s HMAC-signed API command injection in on_event_start hooks

[]

Cracking Passwords from Embedded Linux Devices: The musl DES Crypt $ Salt Problem

2026-03-04
#embedded  #musl  #openwrt  #password-cracking  #hashcat  #des-crypt  #iot  #security-research 

DES crypt hashes with a $ character in the salt — generated by musl libc on OpenWrt routers — break every standard cracking tool. Here’s why, and the one-character fix.

[]

HTB Pterodactyl — Pterodactyl Panel LFI to Root via CVE-2025-6018/6019 PAM+udisks Chain

2026-03-01
#htb  #hackthebox  #ctf  #CVE-2025-49132  #CVE-2025-6018  #CVE-2025-6019  #lfi  #rce  #pearcmd  #pam  #udisks  #libblockdev  #privilege-escalation  #opensuse  #xfs  #suid 

Walkthrough of HackTheBox Pterodactyl machine — from Pterodactyl Panel LFI via pearcmd RCE to root via chained PAM session spoofing and libblockdev XFS resize SUID mount bypass

[]

HTB Facts — Camaleon CMS Mass Assignment to Root

2026-02-28
#htb  #hackthebox  #ctf  #camaleon-cms  #mass-assignment  #path-traversal  #CVE-2025-2304  #CVE-2024-46987  #facter  #privilege-escalation  #ruby-on-rails 

Walkthrough of HackTheBox Facts machine — from Camaleon CMS mass assignment to root via sudo facter custom facts

[]

HTB Interpreter — Mirth Connect RCE to Root via Flask eval() Injection

2026-02-28
#htb  #hackthebox  #ctf  #mirth-connect  #CVE-2023-43208  #xstream  #deserialization  #code-injection  #pbkdf2  #privilege-escalation  #flask  #eval 

Walkthrough of HackTheBox Interpreter machine — from Mirth Connect pre-auth XStream deserialization RCE to root via Flask eval() code injection

[]

HTB WingData — Wing FTP RCE to Root via Python tarfile Filter Bypass

2026-02-28
#htb  #hackthebox  #ctf  #wingftp  #CVE-2025-47812  #CVE-2025-4517  #tarfile  #path-traversal  #lua-injection  #privilege-escalation  #python 

Walkthrough of HackTheBox WingData machine — from Wing FTP Server NULL byte Lua injection to root via Python tarfile filter=“data” PATH_MAX bypass

[]
© 2026 Powered by Hugo :: Theme made by panr