Posted by Zach C on Oct 08
Part 13 (the penultimate installment) of Broken, Abandoned, and
Forgotten Code is up. In this first of two parts covering post
exploitation, we cover how to customize the stage 1 firmware image the
exploit will flash onto the target. It is the job of this minimized
firmware image to bootstrap a fully functional, trojanized stage 2
firmware onto the Netgear R6200.
Here’s a link to part 13:…