You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+61-23Lines changed: 61 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -81,18 +81,18 @@ We learned a lot about this firmware just from a log file. One of perhaps the mo
81
81
The name of this operating system is ***Tina Linux.*** If you haven't done so already, go over to my youtube channel, hit that like button, subscribe and check out the next video...
82
82
83
83
```bash
84
-
$sed -n '36,47p' Bootlogs.txt
85
-
86
-
BusyBox v1.27.2 () built-in shell (ash)
87
-
88
-
_____ _ __ _
89
-
|_ _||_| ___ _ _ |||_| ___ _ _ _ _
90
-
|| _ ||||||__ ||||||||_'_|
91
-
| | | || | || _ | |_____||_||_|_||___||_,_|
92
-
|_| |_||_|_||_|_| Tina is Based on OpenWrt!
93
-
----------------------------------------------
94
-
Tina Linux (Neptune, 5C1C9C53)
95
-
----------------------------------------------
84
+
$sed -n '36,47p' Bootlogs.txt
85
+
86
+
BusyBox v1.27.2 () built-in shell (ash)
87
+
88
+
_____ _ __ _
89
+
|_ _||_| ___ _ _ |||_| ___ _ _ _ _
90
+
|| _ ||||||__ ||||||||_'_|
91
+
| | | || | || _ | |_____||_||_|_||___||_,_|
92
+
|_| |_||_|_||_|_| Tina is Based on OpenWrt!
93
+
----------------------------------------------
94
+
Tina Linux (Neptune, 5C1C9C53)
95
+
----------------------------------------------
96
96
```
97
97
>**Tip:**
98
98
> You can use `sed` to display only lines 36 to 47 from the Bootlogs.txt file.
@@ -160,11 +160,11 @@ To unpack the firmware and extract embedded files or hidden elements, I used bin
160
160
161
161
binwalk -eM doorbell.bin # Extract known file types (-e), and recursively scan extracted files (-M)
162
162
```
163
-
## Basic Analysis of the Firmware Filesystem: 🗃🕵️
163
+
## Basic Analysis of the Firmware's Filesystem: 🗃🕵️
164
164
165
-
#### We are performing *static* analysis, later in the series we look at *dynamic* analysis.
165
+
#### We are performing <ins>*static*</ins> analysis, later in the series we look at <ins>*dynamic*</ins> analysis.
166
166
167
-
##### Here are some of the things we are lookin for:
167
+
##### Here are some of the things we are looking for:
168
168
+ what's inside /etc/shadow and /etc/passwd
169
169
+ configuration files
170
170
+ script files
@@ -176,26 +176,65 @@ To unpack the firmware and extract embedded files or hidden elements, I used bin
176
176
+ URLs, email addresses and IP addresses
177
177
+ and more…
178
178
179
-
#### Interesting... Inside of ***etc/passwd*** we find a **root** user with a shell!
179
+
#### Interesting... Inside of the <ins>passwd</ins> file we find a *root* user with a shell!
Use the "--show" option to display all of the cracked passwords reliably
233
+
Session completed.
234
+
```
197
235
198
-
## Contributing & Collaboration
236
+
🗝fr
237
+
## Contributing & Collaboration: 🤝
199
238
200
239
#### This is an open project, and I welcome contributions and feedback from the community. If you have insights, improvements, or additional findings related to the firmware, please feel free to submit issues or pull requests.
201
240
@@ -217,17 +256,16 @@ To unpack the firmware and extract embedded files or hidden elements, I used bin
217
256
218
257
Your thoughts, questions, and feedback are greatly appreciated! Feel free to open an issue or leave a comment. Let’s collaborate and make this project even better.
219
258
220
-
Thank you for checking out ***[D00rb3ll](https://github.com/DouglasFreshHabian/d00rb3ll). Stay tuned for future updates, and happy reverse engineering!
259
+
Thank you for checking out [D00rb3ll](https://github.com/DouglasFreshHabian/d00rb3ll). Stay tuned for future updates, and happy reverse engineering!
0 commit comments