Blog Category: embedded

MikroTik Authentication Revealed

MikroTik altered its router authentication protocol in 2019, a change which frustrated developers, system admins, and researchers whose customized tooling is now broken. Our team at Margin Research successfully reverse engineered the new process, are we are excited to share protocol details. This blog post outlines the cryptographic steps and offers proof of concept programs to demonstrate the new protocol. … Read More 

Hardware Hacking For Software Hackers

This blogpost will help anyone who is trying to do vulnerability research and/or exploit development on a physical device, and who does not have a debugging setup, shell, or firmware! Or, better put: let's get you some root shells without the hassle of finding a 0-day! … Read More 

WINTERN 2020: IoT Firmware Analysis

Read More