- 16
- 8 363
Mahmoud Jadaan
Germany
เข้าร่วมเมื่อ 27 มิ.ย. 2024
Stuff from what I have heard, read, and learned
X: x.com/masjadaan
LinkedIn: www.linkedin.com/in/mahmoud-jadaan/
Medium: medium.com/@masjadaan
X: x.com/masjadaan
LinkedIn: www.linkedin.com/in/mahmoud-jadaan/
Medium: medium.com/@masjadaan
QEMU_4: System Mode Raspberry PI 3B
QEMU is an open-source emulator and virtualization tool that enables running software designed for different hardware architectures on a host machine. It's widely used in security research for testing exploits, analyzing malware, and safely simulating vulnerable environments.
In this series, several topics will be covered, including:
1. Introduction to Emulation and QEMU
2. User Mode: Emulating ARM Binaries
3. GDB with User Mode
4. System Mode: Emulating a Raspberry Pi Board
---------------------------------------------------------------------------------------------
X: x.com/masjadaan
LinkedIn: www.linkedin.com/in/mahmoud-jadaan/
Medium: medium.com/@masjadaan
Disclaimer: This article is for educational purposes only.
#pentesting #cybersecurity #hardwaresecurity #softwaresecuirty
In this series, several topics will be covered, including:
1. Introduction to Emulation and QEMU
2. User Mode: Emulating ARM Binaries
3. GDB with User Mode
4. System Mode: Emulating a Raspberry Pi Board
---------------------------------------------------------------------------------------------
X: x.com/masjadaan
LinkedIn: www.linkedin.com/in/mahmoud-jadaan/
Medium: medium.com/@masjadaan
Disclaimer: This article is for educational purposes only.
#pentesting #cybersecurity #hardwaresecurity #softwaresecuirty
มุมมอง: 574
วีดีโอ
QEMU_3: Setting Up GDB With QEMU User Mode
มุมมอง 36221 วันที่ผ่านมา
QEMU is an open-source emulator and virtualization tool that enables running software designed for different hardware architectures on a host machine. It's widely used in security research for testing exploits, analyzing malware, and safely simulating vulnerable environments. In this series, several topics will be covered, including: 1. Introduction to Emulation and QEMU 2. User Mode: Emulating...
MQTT Protocol: How Cars Share Their Location: MQTT Explained
มุมมอง 3.5Kหลายเดือนก่อน
MQ Telemetry Transport (MQTT), was originally developed internally by IBM, is a lightweight messaging protocol that uses a publish/subscribe model. It's super popular for machine-to-machine (M2M) communication, especially in low-bandwidth situations. Nowadays, you’ll find it in a ton of industries, from smart homes to automotive, industrial automation, and healthcare. - MQTT Versions - MQTT v3....
QEMU_2: User Mode For Emulating ARM Binaries
มุมมอง 178หลายเดือนก่อน
QEMU is an open-source emulator and virtualization tool that enables running software designed for different hardware architectures on a host machine. It's widely used in security research for testing exploits, analyzing malware, and safely simulating vulnerable environments. In this series, several topics will be covered, including: 1. Introduction to Emulation and QEMU 2. User Mode: Emulating...
QEMU_1: Basic Introduction to Emulation and QEMU
มุมมอง 476หลายเดือนก่อน
QEMU is an open-source emulator and virtualization tool that enables running software designed for different hardware architectures on a host machine. It's widely used in security research for testing exploits, analyzing malware, and safely simulating vulnerable environments. In this series, several topics will be covered, including: 1. Introduction to Emulation and QEMU 2. User Mode: Emulating...
TP-Link Router Analysis 4: Extracting Firmware Partitions (Bootloader, Kernel, Filesystem)
มุมมอง 1222 หลายเดือนก่อน
I've created the tutorial 'TP-Link Router Analysis' to help newcomers to embedded systems security. Simply, I bought a brand new TP-Link router, we'll explore together how to approach such devices and set up our environment for further analysis. The tutorial we'll cover topics include: - Analyzing the attack surface - Identifying UART - Dumping the device firmware - Extracting the Linux kernel ...
TP-Link Router Analysis 3: Dumping The Firmware
มุมมอง 3312 หลายเดือนก่อน
I've created the tutorial 'TP-Link Router Analysis' to help newcomers to embedded systems security. Simply, I bought a brand new TP-Link router, we'll explore together how to approach such devices and set up our environment for further analysis. The tutorial we'll cover topics include: - Analyzing the attack surface - Identifying UART - Dumping the device firmware - Extracting the Linux kernel ...
TP-Link Router Analysis 2: Identifying & Connecting To UART Interface
มุมมอง 1953 หลายเดือนก่อน
I've created the tutorial 'TP-Link Router Analysis' to help newcomers to embedded systems security. Simply, I bought a brand new TP-Link router, we'll explore together how to approach such devices and set up our environment for further analysis. The tutorial we'll cover topics include: - Analyzing the attack surface - Identifying UART - Dumping the device firmware - Extracting the Linux kernel ...
TP-Link Router Analysis 1: Attack Surface & Connecting
มุมมอง 1593 หลายเดือนก่อน
I've created the tutorial 'TP-Link Router Analysis' to help newcomers to embedded systems security. Simply, I bought a brand new TP-Link router, we'll explore together how to approach such devices and set up our environment for further analysis. The tutorial we'll cover topics include: - Analyzing the attack surface - Identifying UART - Dumping the device firmware - Extracting the Linux kernel ...
Firmware 5: Integer Overflow
มุมมอง 1013 หลายเดือนก่อน
Integer overflow is a well-known issue in C/C . It occurs when the result of an arithmetic operation exceeds the maximum or minimum value that a data type can hold. In the case of unsigned integers, overflow causes a wraparound from the maximum value to zero, whereas for signed integers, the behavior is undefined and can lead to unpredictable outcomes. This video demonstrates an example of how ...
Firmware 4: Buffer Overflow Part 3 (Shellcode)
มุมมอง 1103 หลายเดือนก่อน
Buffer overflow is a security vulnerability primarily associated with programming languages like C and C . It occurs when there is no validation on data input, allowing the program to write more data to a buffer than it can hold. This excess data can overwrite adjacent memory locations, leading to unpredictable behavior or system crashes. Exploiting buffer overflows can allow attackers to execu...
Firmware 3: Buffer Overflow Part 2 (Hijack The Execution)
มุมมอง 744 หลายเดือนก่อน
Buffer overflow is a security vulnerability primarily associated with programming languages like C and C . It occurs when there is no validation on data input, allowing the program to write more data to a buffer than it can hold. This excess data can overwrite adjacent memory locations, leading to unpredictable behavior or system crashes. Exploiting buffer overflows can allow attackers to execu...
Firmware 2: Buffer Overflow Part 1 (Unlock The Device)
มุมมอง 4594 หลายเดือนก่อน
Buffer overflow is a security vulnerability primarily associated with programming languages like C and C . It occurs when there is no validation on data input, allowing the program to write more data to a buffer than it can hold. This excess data can overwrite adjacent memory locations, leading to unpredictable behavior or system crashes. Exploiting buffer overflows can allow attackers to execu...
Firmware 1: Extracting Secrets.
มุมมอง 994 หลายเดือนก่อน
For various reasons, some firmware includes sensitive information such as passwords. These passwords can be stored in various forms: plaintext, hashed, or encoded. However, this method is insecure because attackers can easily extract these secrets. In this video, we demonstrate the simplest techniques for obtaining these passwords. X: x.com/masjadaan LinkedIn: www.linkedin.com/in/mahmoud-jadaan...
Linux: Reverse Shell Via Vim
มุมมอง 1254 หลายเดือนก่อน
The VIM editor needs no introduction; it is a well-known and widely used command-line text editor that comes pre-installed on most Unix and Linux operating systems. However, it can be used for malicious activities such as calling a reverse shell to an attacker machine. if you prefer reading article: Linkedin: www.linkedin.com/pulse/backdoor-via-vim-mahmoud-jadaan-yd0ee?trk=public_profile_articl...
Great walkthrough. Thank you!
much appropriated thanks :)
thank you for a very good tutorial. please share the ppt or the walkthrough file to some gist or any online drive. many thanks in advance.
I'm glad you like the tutorial. I've uploaded the presentation and the commands on my Github :) github.com/masjadaan/TH-camVideos/blob/main/QEMU/4_qemu_system_mode.odp
Hello
Hello Mr. Gtasaplays :)
Nice work Keep them coming!
Thank you. I'll try my best :)
very helpful.
I'm really glad you find it helpful, much appreciated
Thanks a lot a gem that only few can appreciate :)
Thank you a lot, I'm very glad to hear that :)
that's really nice topic with explanation
thanks, I'm glad you like it :)
Salem ! Excellent content, new subscriber :)
Hey, Welcome aboard :)
Nice demonstration Mahmoud keep it up 🙏
Hey Amine. I'm glad you like it, thanks :)
Great video. One quick question if QEMU is an emulator then why do it uses KVM (hypervisor)?
That's good question. QEMU operates in three modes: user mode, system mode, and virtualization mode. To avoid using emulation, in the virtualization mode Kernel-based Virtual Machine (KVM) can be used assuming the host and target both have the same architecture.
Great video 👏
Thanks Ali :)
nice video, as always :)
and I'm always glad to hear that :)
Very insightful
Glad it was helpful!
amazing
Thank you! Cheers!
Great stuff
Thanks Ali
Amazing video man! Your didactic it’s also very good, keep posting videos 💯
Heey man, thanks a lot and I'm glad you like the video :)
Like and subscribe
High quality content👍. Invest some mics and fix audio and you will blow up soon. Also speak more confidently. You are an expert act like one. Be authoritive.
Thanks for the feedback :)
thanks a lot.greatly appreciate it. by the way can you share your GitHub repo as well?
sure, I have couple of articles there I'm planning to convert all of them to video sometime soon :) github.com/masjadaan
great content. can't believe I am the 3rd subscriber. you will blow up soon.
Thanks, I'm glad you like it. These are my first two videos ever on TH-cam.