all InfoSec news
Bypassing MPX Node Authentication — Firmware analysis
InfoSec Write-ups - Medium infosecwriteups.com
Bypassing MPX Node Authentication — Firmware analysis
Introduction
Hi again!
I’m back once more with a new Red Team engagement snippet that delves deeper into the firmware and combines Black Box testing without source code, credentials, or even any information about the assets to simulate the malicious outsider actor (Black Hat), then turns it into a White Box through firmware analysis and research techniques.
When you are in a Red Team engagement, all you need to think about is the …
actor analysis assets authentication back black box black box testing black hat box bypassing code credentials cybersecurity engagement firmware information information security infosec malicious node red team red team engagement security research source code team testing