tbhaxor
  • About Me
  • Series
  • Support Me

forensics

A collection of 4 posts
Find Hidden Network Backdoor in WiFi Firmware
wifi-security

Find Hidden Network Backdoor in WiFi Firmware

In this tutorial, you will learn how to use static analysis to check for backdoors in the OpenWRT firmware binary.
Sep 27, 2022 4 min read
Exploiting Insecure Docker Registry
docker

Exploiting Insecure Docker Registry

Assume you're in a situation where you can't use Docker. How would you use the remote registry to get image FS layers? This guide will walk you through using simply the curl command to interface with the Docker registry.
Apr 4, 2022 4 min read
Hunting for Malicious Binaries and Backdoors in the Running Containers
docker

Hunting for Malicious Binaries and Backdoors in the Running Containers

An attacker might exploit one of the container's service and install malicious apps or a backdoor to get access to your container later. In this post, you'll learn how to use the "docker diff" plugin to do forensics and incident response on a running docker container.
Apr 1, 2022 5 min read
Analyzing Docker Image for Retrieving Secrets
docker

Analyzing Docker Image for Retrieving Secrets

In this tour, you'll learn how to start a container from a checkpoint to restore its process and memory state, as well as how to utilise container-diff tool to analyze the exported docker images.
Mar 29, 2022 5 min read
Page 1 of 1
tbhaxor © 2023
Powered by Ghost