tbhaxor's Blog
  • About Me
  • Series
  • Support Me
Sign in Subscribe

forensics

A collection of 4 posts
Find Hidden Network Backdoor in WiFi Firmware
wifi-security

Find Hidden Network Backdoor in WiFi Firmware

In this tutorial, you will learn how to use static analysis to check for backdoors in the OpenWRT firmware binary.
27 Sep 2022 4 min read
Exploiting Insecure Docker Registry
docker

Exploiting Insecure Docker Registry

Assume you're in a situation where you can't use Docker. How would you use the remote registry to get image FS layers? This guide will walk you through using simply the curl command to interface with the Docker registry.
04 Apr 2022 4 min read
Hunting for Malicious Binaries and Backdoors in the Running Containers
docker

Hunting for Malicious Binaries and Backdoors in the Running Containers

An attacker might exploit one of the container's service and install malicious apps or a backdoor to get access to your container later. In this post, you'll learn how to use the "docker diff" plugin to do forensics and incident response on a running docker container.
01 Apr 2022 5 min read
Analyzing Docker Image for Retrieving Secrets
docker

Analyzing Docker Image for Retrieving Secrets

In this tour, you'll learn how to start a container from a checkpoint to restore its process and memory state, as well as how to utilise container-diff tool to analyze the exported docker images.
29 Mar 2022 5 min read
Page 1 of 1
tbhaxor's Blog © 2025
Powered by Ghost