你屏蔽了 @0xricksanchez
确定要查看这些推文吗?查看推文不会取消屏蔽 @0xricksanchez
-
置顶推文
For the time being here is the 4th and final part of my little D-Link reversing blog:https://0x00sec.org/t/breaking-the-d-link-dir3060-firmware-encryption-static-analysis-of-the-decryption-routine-part-2-2/22260 …
显示这个主题帖谢谢。Twitter 会使用此信息,来优化你的时间线。 撤销撤销 -
ً 转推了
Last time I blogged about how to write a custom firmware decryption routine for a bunch of Dlink firmware images and this is what happened. A thread:https://0x00sec.org/t/breaking-the-d-link-dir3060-firmware-encryption-static-analysis-of-the-decryption-routine-part-2-2/22260#heading--conclusion …
显示这个主题帖谢谢。Twitter 会使用此信息,来优化你的时间线。 撤销撤销 -
... when there a more than enough willing people that are willing to provide you with a free pentest of your products. Wouldn't that be more beneficial?
显示这个主题帖谢谢。Twitter 会使用此信息,来优化你的时间线。 撤销撤销 -
I mean I get that providing firmware integrity measures is useful and all but from what it looks like at first glance swapping out the certificate does not change anything? Also, why even bothering 'inventing' a home brew encryption scheme in the first place...
显示这个主题帖谢谢。Twitter 会使用此信息,来优化你的时间线。 撤销撤销 -
So is it just me who fails to see how changing the certificate solves the issue of "malicious users [...] changing the firmware that is loaded and executed by the device" when these exact people can just grab the latest firmware and unpack it again to do their research?
显示这个主题帖谢谢。Twitter 会使用此信息,来优化你的时间线。 撤销撤销 -
This does not change the fact, that the binary responsible for decryption a firmware ('imgdecrypt') is still unchanged with all the same hard coded cipher constants that lets you unpack the new firmware without any modifications to the script https://github.com/0xricksanchez/dlink-decrypt …pic.twitter.com/8QhaKiybtH
显示这个主题帖谢谢。Twitter 会使用此信息,来优化你的时间线。 撤销撤销 -
"The firmware encryption key is unique to this router model and does not affect other models ". I guess they're referring to the fact that the public.pem certificate is different across devices. This is true. They even changed the certificate in the new hot fixed FW linked abovepic.twitter.com/UFNGy6VmWF
显示这个主题帖谢谢。Twitter 会使用此信息,来优化你的时间线。 撤销撤销 -
"The issue is limited to the DIR-3040-US model", which is clearly not true as I have shown in my blog that you can unpack and grab all firmware image contents of at least the following models DIR-882, DIR-1960, DIR-2660, DIR-3060pic.twitter.com/4ah5kbZD8j
显示这个主题帖谢谢。Twitter 会使用此信息,来优化你的时间线。 撤销撤销 -
As a result
@Dlink was notified and made aware of this 'security issue' (which I don't think it is btw). They acknowledged it nevertheless and issued a new firmware update claiming the following: https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10188 …显示这个主题帖谢谢。Twitter 会使用此信息,来优化你的时间线。 撤销撤销 -
The possibility of decrypting these FW images was later confirmed by another researcher and the story was even picked up by
@BleepinComputerhttps://www.bleepingcomputer.com/news/security/d-link-blunder-firmware-encryption-key-exposed-in-unencrypted-image/ …显示这个主题帖谢谢。Twitter 会使用此信息,来优化你的时间线。 撤销撤销 -
Last time I blogged about how to write a custom firmware decryption routine for a bunch of Dlink firmware images and this is what happened. A thread:https://0x00sec.org/t/breaking-the-d-link-dir3060-firmware-encryption-static-analysis-of-the-decryption-routine-part-2-2/22260#heading--conclusion …
显示这个主题帖谢谢。Twitter 会使用此信息,来优化你的时间线。 撤销撤销 -
Honestly, this is so dope! Good visualizations help so much to grasp any concepthttps://twitter.com/gamozolabs/status/1288440436680306688 …
0:28谢谢。Twitter 会使用此信息,来优化你的时间线。 撤销撤销 -
This is awkward... https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10188 …
显示这个主题帖谢谢。Twitter 会使用此信息,来优化你的时间线。 撤销撤销 -
I guess I can remove "getting quoted on a news site" from my bucket list now

https://twitter.com/BleepinComputer/status/1285968379128549379 …显示这个主题帖谢谢。Twitter 会使用此信息,来优化你的时间线。 撤销撤销 -
ً 转推了
For the time being here is the 4th and final part of my little D-Link reversing blog:https://0x00sec.org/t/breaking-the-d-link-dir3060-firmware-encryption-static-analysis-of-the-decryption-routine-part-2-2/22260 …
显示这个主题帖谢谢。Twitter 会使用此信息,来优化你的时间线。 撤销撤销 -
Apparently some markdown code blocks broke, which I did not notice yesterday. Article should be all fixed now
显示这个主题帖谢谢。Twitter 会使用此信息,来优化你的时间线。 撤销撤销 -
谢谢。Twitter 会使用此信息,来优化你的时间线。 撤销撤销
-
And here is the repo containing all the codehttps://github.com/0xricksanchez/dlink-decrypt …
显示这个主题帖谢谢。Twitter 会使用此信息,来优化你的时间线。 撤销撤销 -
As the tweet gained so much traction I decided to update the repository with some categories and a handful of new papers! If I missed some good ones please hit me up or create a PR! I'll try to keep the list up 2 date with new publications :)!https://twitter.com/0xricksanchez/status/1281586049605668865 …
谢谢。Twitter 会使用此信息,来优化你的时间线。 撤销撤销 -
Apparently you still need something to read
. I’ll extend and improve categorization within the next few days显示这个主题帖谢谢。Twitter 会使用此信息,来优化你的时间线。 撤销撤销
加载似乎需要一段时间。
Twitter 可能超载或出现了暂时故障。重试或访问 Twitter 状态以了解更多信息。