Author: James Woolley

NTP Amplification Discovery

Introduction NTP amplification attacks are a form of DDOS which use NTP servers to turn small requests into large responses which can be directed to the victims computer. NTP amplification makes use of the MONLIST command. The MONLIST command directs the NTP server to respond with the last 600 IP addresses which used the server. […]

Continue Reading

VNC Authentication checking with Python

In this post i describe a small python script which can be used to determine the type of authentication used on a VNC Server. It uses the Scapy packet manipulation program to perform all the network data transmissions and retrievals. The program may not be perfect, but with my limited testing it seemed to work […]

Continue Reading

Hacking the TalkTalk HUAWEI HG523a Router Part 2

For part 1 please Click Here. OK. So i have access to the routers busybox console. I found by typing the busybox command it displays all the commands available on the device. As you can see the amount of commands available is quite small. Looking at some other busybox console outputs posted online there are […]

Continue Reading

Hacking the TalkTalk HUAWEI HG523a Router

I got my hands on a TalkTalk HUAWEI HG523a. This is one of the routers distributed to TalkTalk subscribers. This is my first attempt of doing any kind of embedded device analysis so i decided it would be beneficial to document the steps i take. As i progress i will write new posts detailing what […]

Continue Reading