<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>MIPS on Matteo Croce personal homepage</title><link>https://matteocroce.it/tags/mips/</link><description>Recent content in MIPS on Matteo Croce personal homepage</description><generator>Hugo</generator><language>en-US</language><lastBuildDate>Sat, 31 May 2014 12:00:00 +0100</lastBuildDate><atom:link href="https://matteocroce.it/tags/mips/index.xml" rel="self" type="application/rss+xml"/><item><title>TP-Link configuration file decrypt</title><link>https://matteocroce.it/blog/tplink/</link><pubDate>Sat, 31 May 2014 12:00:00 +0100</pubDate><guid>https://matteocroce.it/blog/tplink/</guid><description>&lt;p&gt;Some routers allow you to save and restore the configuration from a file locally.
This is nice because by saving the configuration, altering the file and uploading it again,
you can change settings not exposed in the interface.&lt;br&gt;
For example, on my &lt;a href="https://www.dlink.com/uk/en/products/dsl-2640b-adsl-2-wireless-g-router-with-4-port-10-100-switch"&gt;D-Link DSL-2640B&lt;/a&gt;
I could disable a broken QoS which was slowing down the download speed just by setting &lt;code&gt;X_BROADCOM_COM_ATMEnbQos&lt;/code&gt; to FALSE.&lt;/p&gt;
&lt;p&gt;When I got a TP-Link wireless access point, I tried the same trick but found that they had started encrypting the configuration file, making it impossible to edit manually.&lt;/p&gt;</description></item><item><title>Hacking the OSBRiDGE 24XLGi</title><link>https://matteocroce.it/blog/osbridge/</link><pubDate>Tue, 06 May 2008 01:20:00 +0100</pubDate><guid>https://matteocroce.it/blog/osbridge/</guid><description>&lt;h2 id="the-target"&gt;The target&lt;/h2&gt;
&lt;p&gt;A friend gave me an &lt;a href="http://www.osbridge.com/download/OSBRiDGE_24XLG.pdf"&gt;OSBRiDGE 24XLGi&lt;/a&gt;; its case had broken and it was no longer suitable for outdoor use.&lt;br&gt;
The router is pretty locked down: a network scan doesn&amp;rsquo;t reveal any open ports other than the web interface, and connecting to the serial port reveals a crippled bootloader.&lt;br&gt;
Firmware upgrades are done via the web interface, and the firmware is checked for integrity.&lt;/p&gt;
&lt;h2 id="finding-a-command-injection"&gt;Finding a command injection&lt;/h2&gt;
&lt;p&gt;The web interface has the usual features found in a router, along with a &amp;ldquo;service&amp;rdquo; page which allows you to ping a host.&lt;br&gt;
I suspected that it just execs ping via the system shell, but the hostname size is limited to 15 characters (12 numbers and 3 dots).&lt;br&gt;
Nothing that can&amp;rsquo;t be cheated with the browser inspector, so I did it and tried to ping the hostname &amp;ldquo;192.168.1.129 ; ping 192.168.1.150&amp;rdquo;, with 192.168.1.129 being my notebook IP and 192.168.1.150 an unused one.&lt;/p&gt;</description></item></channel></rss>