Exploit research
1. Initial findings
1.1 file
$ file httpd
httpd: ELF 32-bit LSB executable, MIPS, MIPS32 version 1 (SYSV), dynamically linked, interpreter /lib/ld-uClibc.so.0, stripped1.2 checksec
$ pwn checksec httpd
Arch: mips-32-little
RELRO: No RELRO
Stack: No canary found
NX: NX disabled
PIE: No PIE (0x400000)
RWX: Has RWX segments$ cat /proc/sys/kernel/randomize_va_space1.3 objdump
2. GDB, gdbserver
2.1 Compile gdbserver for the target's architecture
gdbserver for the target's architecture2.2 gdbserver on target router
gdbserver on target router2.3 Connect to remote target from host machine
3. Initial enumeration
3.1 Webpage @port 80
3.2 index.asp
index.aspLast updated