Mahmoud Jadaan
Mahmoud Jadaan
  • 16
  • 8 363
QEMU_4: System Mode Raspberry PI 3B
QEMU is an open-source emulator and virtualization tool that enables running software designed for different hardware architectures on a host machine. It's widely used in security research for testing exploits, analyzing malware, and safely simulating vulnerable environments.
In this series, several topics will be covered, including:
1. Introduction to Emulation and QEMU
2. User Mode: Emulating ARM Binaries
3. GDB with User Mode
4. System Mode: Emulating a Raspberry Pi Board
---------------------------------------------------------------------------------------------
X: x.com/masjadaan
LinkedIn: www.linkedin.com/in/mahmoud-jadaan/
Medium: medium.com/@masjadaan
Disclaimer: This article is for educational purposes only.
#pentesting #cybersecurity #hardwaresecurity #softwaresecuirty
มุมมอง: 574

วีดีโอ

QEMU_3: Setting Up GDB With QEMU User Mode
มุมมอง 36221 วันที่ผ่านมา
QEMU is an open-source emulator and virtualization tool that enables running software designed for different hardware architectures on a host machine. It's widely used in security research for testing exploits, analyzing malware, and safely simulating vulnerable environments. In this series, several topics will be covered, including: 1. Introduction to Emulation and QEMU 2. User Mode: Emulating...
MQTT Protocol: How Cars Share Their Location: MQTT Explained
มุมมอง 3.5Kหลายเดือนก่อน
MQ Telemetry Transport (MQTT), was originally developed internally by IBM, is a lightweight messaging protocol that uses a publish/subscribe model. It's super popular for machine-to-machine (M2M) communication, especially in low-bandwidth situations. Nowadays, you’ll find it in a ton of industries, from smart homes to automotive, industrial automation, and healthcare. - MQTT Versions - MQTT v3....
QEMU_2: User Mode For Emulating ARM Binaries
มุมมอง 178หลายเดือนก่อน
QEMU is an open-source emulator and virtualization tool that enables running software designed for different hardware architectures on a host machine. It's widely used in security research for testing exploits, analyzing malware, and safely simulating vulnerable environments. In this series, several topics will be covered, including: 1. Introduction to Emulation and QEMU 2. User Mode: Emulating...
QEMU_1: Basic Introduction to Emulation and QEMU
มุมมอง 476หลายเดือนก่อน
QEMU is an open-source emulator and virtualization tool that enables running software designed for different hardware architectures on a host machine. It's widely used in security research for testing exploits, analyzing malware, and safely simulating vulnerable environments. In this series, several topics will be covered, including: 1. Introduction to Emulation and QEMU 2. User Mode: Emulating...
TP-Link Router Analysis 4: Extracting Firmware Partitions (Bootloader, Kernel, Filesystem)
มุมมอง 1222 หลายเดือนก่อน
I've created the tutorial 'TP-Link Router Analysis' to help newcomers to embedded systems security. Simply, I bought a brand new TP-Link router, we'll explore together how to approach such devices and set up our environment for further analysis. The tutorial we'll cover topics include: - Analyzing the attack surface - Identifying UART - Dumping the device firmware - Extracting the Linux kernel ...
TP-Link Router Analysis 3: Dumping The Firmware
มุมมอง 3312 หลายเดือนก่อน
I've created the tutorial 'TP-Link Router Analysis' to help newcomers to embedded systems security. Simply, I bought a brand new TP-Link router, we'll explore together how to approach such devices and set up our environment for further analysis. The tutorial we'll cover topics include: - Analyzing the attack surface - Identifying UART - Dumping the device firmware - Extracting the Linux kernel ...
TP-Link Router Analysis 2: Identifying & Connecting To UART Interface
มุมมอง 1953 หลายเดือนก่อน
I've created the tutorial 'TP-Link Router Analysis' to help newcomers to embedded systems security. Simply, I bought a brand new TP-Link router, we'll explore together how to approach such devices and set up our environment for further analysis. The tutorial we'll cover topics include: - Analyzing the attack surface - Identifying UART - Dumping the device firmware - Extracting the Linux kernel ...
TP-Link Router Analysis 1: Attack Surface & Connecting
มุมมอง 1593 หลายเดือนก่อน
I've created the tutorial 'TP-Link Router Analysis' to help newcomers to embedded systems security. Simply, I bought a brand new TP-Link router, we'll explore together how to approach such devices and set up our environment for further analysis. The tutorial we'll cover topics include: - Analyzing the attack surface - Identifying UART - Dumping the device firmware - Extracting the Linux kernel ...
Firmware 5: Integer Overflow
มุมมอง 1013 หลายเดือนก่อน
Integer overflow is a well-known issue in C/C . It occurs when the result of an arithmetic operation exceeds the maximum or minimum value that a data type can hold. In the case of unsigned integers, overflow causes a wraparound from the maximum value to zero, whereas for signed integers, the behavior is undefined and can lead to unpredictable outcomes. This video demonstrates an example of how ...
Firmware 4: Buffer Overflow Part 3 (Shellcode)
มุมมอง 1103 หลายเดือนก่อน
Buffer overflow is a security vulnerability primarily associated with programming languages like C and C . It occurs when there is no validation on data input, allowing the program to write more data to a buffer than it can hold. This excess data can overwrite adjacent memory locations, leading to unpredictable behavior or system crashes. Exploiting buffer overflows can allow attackers to execu...
Firmware 3: Buffer Overflow Part 2 (Hijack The Execution)
มุมมอง 744 หลายเดือนก่อน
Buffer overflow is a security vulnerability primarily associated with programming languages like C and C . It occurs when there is no validation on data input, allowing the program to write more data to a buffer than it can hold. This excess data can overwrite adjacent memory locations, leading to unpredictable behavior or system crashes. Exploiting buffer overflows can allow attackers to execu...
Firmware 2: Buffer Overflow Part 1 (Unlock The Device)
มุมมอง 4594 หลายเดือนก่อน
Buffer overflow is a security vulnerability primarily associated with programming languages like C and C . It occurs when there is no validation on data input, allowing the program to write more data to a buffer than it can hold. This excess data can overwrite adjacent memory locations, leading to unpredictable behavior or system crashes. Exploiting buffer overflows can allow attackers to execu...
Firmware 1: Extracting Secrets.
มุมมอง 994 หลายเดือนก่อน
For various reasons, some firmware includes sensitive information such as passwords. These passwords can be stored in various forms: plaintext, hashed, or encoded. However, this method is insecure because attackers can easily extract these secrets. In this video, we demonstrate the simplest techniques for obtaining these passwords. X: x.com/masjadaan LinkedIn: www.linkedin.com/in/mahmoud-jadaan...
Linux: Reverse Shell Via Vim
มุมมอง 1254 หลายเดือนก่อน
The VIM editor needs no introduction; it is a well-known and widely used command-line text editor that comes pre-installed on most Unix and Linux operating systems. However, it can be used for malicious activities such as calling a reverse shell to an attacker machine. if you prefer reading article: Linkedin: www.linkedin.com/pulse/backdoor-via-vim-mahmoud-jadaan-yd0ee?trk=public_profile_articl...
Linux: Hijacking Shared Libraries
มุมมอง 1.5K4 หลายเดือนก่อน
Linux: Hijacking Shared Libraries

ความคิดเห็น

  • @hewhosortsofplaysaninstrum9046
    @hewhosortsofplaysaninstrum9046 6 วันที่ผ่านมา

    Great walkthrough. Thank you!

    • @MahmoudJadaan
      @MahmoudJadaan 6 วันที่ผ่านมา

      much appropriated thanks :)

  • @dwikristianto
    @dwikristianto 6 วันที่ผ่านมา

    thank you for a very good tutorial. please share the ppt or the walkthrough file to some gist or any online drive. many thanks in advance.

    • @MahmoudJadaan
      @MahmoudJadaan 6 วันที่ผ่านมา

      I'm glad you like the tutorial. I've uploaded the presentation and the commands on my Github :) github.com/masjadaan/TH-camVideos/blob/main/QEMU/4_qemu_system_mode.odp

  • @gtasaplays-os1dd
    @gtasaplays-os1dd 14 วันที่ผ่านมา

    Hello

    • @MahmoudJadaan
      @MahmoudJadaan 14 วันที่ผ่านมา

      Hello Mr. Gtasaplays :)

  • @hewhosortsofplaysaninstrum9046
    @hewhosortsofplaysaninstrum9046 20 วันที่ผ่านมา

    Nice work Keep them coming!

    • @MahmoudJadaan
      @MahmoudJadaan 19 วันที่ผ่านมา

      Thank you. I'll try my best :)

  • @munwwarhussainshelia
    @munwwarhussainshelia 21 วันที่ผ่านมา

    very helpful.

    • @MahmoudJadaan
      @MahmoudJadaan 21 วันที่ผ่านมา

      I'm really glad you find it helpful, much appreciated

  • @amortalbeing
    @amortalbeing 21 วันที่ผ่านมา

    Thanks a lot a gem that only few can appreciate :)

    • @MahmoudJadaan
      @MahmoudJadaan 21 วันที่ผ่านมา

      Thank you a lot, I'm very glad to hear that :)

  • @Undertheroot
    @Undertheroot หลายเดือนก่อน

    that's really nice topic with explanation

    • @MahmoudJadaan
      @MahmoudJadaan หลายเดือนก่อน

      thanks, I'm glad you like it :)

  • @sp4yke
    @sp4yke หลายเดือนก่อน

    Salem ! Excellent content, new subscriber :)

    • @MahmoudJadaan
      @MahmoudJadaan หลายเดือนก่อน

      Hey, Welcome aboard :)

  • @Aminedemetz
    @Aminedemetz หลายเดือนก่อน

    Nice demonstration Mahmoud keep it up 🙏

    • @MahmoudJadaan
      @MahmoudJadaan หลายเดือนก่อน

      Hey Amine. I'm glad you like it, thanks :)

  • @moizkhan132
    @moizkhan132 หลายเดือนก่อน

    Great video. One quick question if QEMU is an emulator then why do it uses KVM (hypervisor)?

    • @MahmoudJadaan
      @MahmoudJadaan หลายเดือนก่อน

      That's good question. QEMU operates in three modes: user mode, system mode, and virtualization mode. To avoid using emulation, in the virtualization mode Kernel-based Virtual Machine (KVM) can be used assuming the host and target both have the same architecture.

  • @4liraah
    @4liraah 3 หลายเดือนก่อน

    Great video 👏

    • @MahmoudJadaan
      @MahmoudJadaan 3 หลายเดือนก่อน

      Thanks Ali :)

  • @4liraah
    @4liraah 3 หลายเดือนก่อน

    nice video, as always :)

    • @MahmoudJadaan
      @MahmoudJadaan 3 หลายเดือนก่อน

      and I'm always glad to hear that :)

  • @4liraah
    @4liraah 4 หลายเดือนก่อน

    Very insightful

    • @MahmoudJadaan
      @MahmoudJadaan 3 หลายเดือนก่อน

      Glad it was helpful!

  • @4liraah
    @4liraah 4 หลายเดือนก่อน

    amazing

    • @MahmoudJadaan
      @MahmoudJadaan 4 หลายเดือนก่อน

      Thank you! Cheers!

  • @4liraah
    @4liraah 4 หลายเดือนก่อน

    Great stuff

  • @culturadocaractere
    @culturadocaractere 4 หลายเดือนก่อน

    Amazing video man! Your didactic it’s also very good, keep posting videos 💯

    • @MahmoudJadaan
      @MahmoudJadaan 4 หลายเดือนก่อน

      Heey man, thanks a lot and I'm glad you like the video :)

  • @johnmaris1582
    @johnmaris1582 4 หลายเดือนก่อน

    Like and subscribe

  • @johnmaris1582
    @johnmaris1582 4 หลายเดือนก่อน

    High quality content👍. Invest some mics and fix audio and you will blow up soon. Also speak more confidently. You are an expert act like one. Be authoritive.

    • @MahmoudJadaan
      @MahmoudJadaan 4 หลายเดือนก่อน

      Thanks for the feedback :)

  • @amortalbeing
    @amortalbeing 4 หลายเดือนก่อน

    thanks a lot.greatly appreciate it. by the way can you share your GitHub repo as well?

    • @MahmoudJadaan
      @MahmoudJadaan 4 หลายเดือนก่อน

      sure, I have couple of articles there I'm planning to convert all of them to video sometime soon :) github.com/masjadaan

  • @momentomoridoth2007
    @momentomoridoth2007 4 หลายเดือนก่อน

    great content. can't believe I am the 3rd subscriber. you will blow up soon.

    • @MahmoudJadaan
      @MahmoudJadaan 4 หลายเดือนก่อน

      Thanks, I'm glad you like it. These are my first two videos ever on TH-cam.