Used a Gameboy to get a meterpreter sesh

Used a Gameboy to get a meterpreter sesh

I got this knockoff Gameboy called a Miyoo Mini+. It has Linux firmware running OnionOS. I found it has a terminal with limited capabilities. Since netcat was installed, I was able to get a reverse shell onto my kali box and perform an nmap scan through the rev shell to find a Win7 VM that I setup. Was able to pivot to there using the Eternal Blue exploit to get a meterpreter sesh.

Although this was in a controlled lab environment, hope this shows the need for IoT security.

submitted by /u/jet_set_default
[link] [comments]


from hacking: security in practice https://ift.tt/Y2l1Wra

Comments