May 2, 2023, 6:45 p.m. | Momen Eldawakhly (Cyber Guy)

InfoSec Write-ups - Medium infosecwriteups.com

Bypassing MPX Node Authentication — Firmware analysis

Introduction

Hi again!

I’m back once more with a new Red Team engagement snippet that delves deeper into the firmware and combines Black Box testing without source code, credentials, or even any information about the assets to simulate the malicious outsider actor (Black Hat), then turns it into a White Box through firmware analysis and research techniques.

When you are in a Red Team engagement, all you need to think about is the …

actor analysis assets authentication back black box black box testing black hat box bypassing code credentials cybersecurity engagement firmware information information security infosec malicious node red team red team engagement security research source code team testing

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Cyber Security Architect - SR

@ ERCOT | Taylor, TX

SOC Analyst

@ Wix | Tel Aviv, Israel

Associate Director, SIEM & Detection Engineering(remote)

@ Humana | Remote US

Senior DevSecOps Architect

@ Computacenter | Birmingham, GB, B37 7YS