DIR-868L Emulation and Exploitation


RII Router Dojo.

A copy of the firmware to emulate is available in the challenge VM at /challenge/DIR-868L_REVA_FIRMWARE_1.12B04.zip , on our blog , or directly from the vendor.


Challenges

Implement full-system emulation of non-native DIR-868L firmware.
Implement your emulation solution at /home/hacker/start_emulation. run check will attempt to run your emulation from there. run check waits for /home/hacker/start_emulation to exit before running the SLA checker. The SLA checker expects that the emulation is in a good state and will start verifying functionality right away.

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

You are provided an emulated DIR-868L. Attempt to exploit the firmware with CVE-2017-14948.
Implement your exploit at /home/hacker/run_attack. The emulated target is provided for you; execute run qemu to start it. Once you see the "Emulation started" message, you may execute run check to test your exploit. Like in emulation, run check waits for your script, /home/hacker/run_attack, to exit before it runs the SLA checker. The SLA checker expects that the C2 follow-on in a good state and it can send commands right away.

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

30-Day Scoreboard:

This scoreboard reflects solves for challenges in this module after the module launched in this dojo.

Rank Hacker Badges Score