Skip to content

Latest commit

 

History

History
84 lines (65 loc) · 2.97 KB

2018-04-03.md

File metadata and controls

84 lines (65 loc) · 2.97 KB

Ideas para hacer con un router

  • Ejecutar scripts
  • Instalar aplicaciones
  • Analizar información sobre llamadas (recibidas, realizadas, etc.)
  • Enviar información desde el router (mail)
  • Ver ficheros modificados
  • Ver la IP asignada por el proveedor
  • Ver la arquitectura del router
  • Ejecutar scripts de Python
  • Ejecutar código PHP
  • Desensamblar aplicaciones

busybox

For all the standard Unix utilities that the system didn't have. https://busybox.net/downloads/BusyBox.html

Binarios busybox

https://www.busybox.net/downloads/binaries/

The Buildroot user manual

https://buildroot.org/downloads/manual/manual.html

Busybox container and rootfs builder for minimal Docker base images with Python

https://github.com/odise/busybox-python

Binario para mips

https://www.busybox.net/downloads/binaries/1.28.1-defconfig-multiarch/busybox-mips.log

Router Mitrastar HGW-2501GN-R2: Shell e Ingeniería inversa (para crear firmwares modificadas, por ejemplo) (Actualizado)

http://blog.theliel.es/2015/10/router-mitrastar-hgw-2501gn-r2-shell-e-ingenieria-inversa-para-crear-firmwares-modificadas-por-ejemplo.html

MitraStar DSL-100HN-T1/GPT-2541GNAC - Privilege Escalation

https://www.exploit-db.com/exploits/43061/

Elevando privilegios en routers domésticos

http://jolama.es/temas/router-attack/index.php

Enviar binario por SCP

To copy files from the local system to a remote system:

scp file... [email protected]:path

To copy files from a remote system to your local system:

scp [email protected]:path ... dest

Post Exploitation

Post Exploitation Command List Wiki

https://github.com/mubix/post-exploitation/wiki

Linux Post Exploitation Command List

https://github.com/mubix/post-exploitation/wiki/Linux-Post-Exploitation-Command-List

Post Exploitation without Automated Tools (pdf) - InfoSec Resources

This book acts as an introduction to those who know how to use Metasploit and do not know what happens behind the screens. http://resources.infosecinstitute.com/wp-content/uploads/Post-Exploitation-without-Automated-Tools1.pdf

Ejecutar PHP

Ejecutar código PHP desde PowerShell

https://www.jesusninoc.com/2017/03/01/ejecutar-codigo-php-desde-powershell/

Ejecutar un cmdlet de PowerShell desde PHP

https://www.jesusninoc.com/2018/01/06/ejecutar-un-cmdlet-de-powershell-desde-php/

Ejecutar en PHP un cmdlet de PowerShell en Base64

https://www.jesusninoc.com/2018/02/21/ejecutar-en-php-un-cmdlet-de-powershell-en-base64/

ATM and Frame Relay Services

Service Category

  • Constant Bit Rate (CBR): Circuit emulation, videoconferencing,
  • Real-Time Variable Bit Rate (rt-VBR): Compressed video/audio
  • Non-Real-Time Variable Bit Rate (nrt-VBR): Critical data
  • Available Bit Rate (ABR): LAN, interconnection,
  • Unspecified Bit Rate (UBR) File transfer, message transfer

http://www.csd.uoc.gr/~hy536/atm_fr.pdf

Virtual Paths and Virtual Channels

  • Transmission Path
  • Virtual Channel
  • Virtual Path

https://technet.microsoft.com/en-us/library/cc978149.aspx