Exploit research
1. Initial findings
1.1 checksec
$ pwn checksec gn-httpd
[*] '/home/user/linksys-e1200-v2/gn-httpd'
Arch: mips-32-little
RELRO: No RELRO
Stack: No canary found
NX: NX disabled
PIE: No PIE (0x400000)
RWX: Has RWX segments1.2 objdump
$ sudo apt install binutils-mipsel-linux-gnu
$ ls /usr/mipsel-linux-gnu/bin
ar as gold ld ld.bfd ld.gold nm objcopy objdump ranlib readelf strip
$ /usr/mipsel-linux-gnu/bin/objdump -d --disassemble=get_merge_ipaddr gn-httpd2. GDB, gdbserver
2.1 Compile gdbserver for the target's architecture
gdbserver for the target's architecture2.2 gdbserver on target router
gdbserver on target router2.3 Connect to remote target from host machine
3. Initial enumeration
3.1 Webpage @port 80
3.2 index.asp
index.aspLast updated