Rooting the MikroTik routers (SHA2017)

preview_player
Показать описание
In this talk I describe my journey into reverse engineering parts of MikroTik system to gain access to hardware features and the shell behind the RouterOS that has no “ls”.

#NetworkSecurity #DeviceSecurity

Kirils Solovjovs
Рекомендации по теме
Комментарии
Автор

if you are doing this now you can use ls just budybox ls and that works for ls and some other commands

Dragoken