Hacking Millions of Modems (and Investigating Who Hacked My Modem)
Introduction
Two years ago, something very strange happened to me while working from my home network. I was exploiting a blind XXE vulnerability that required an external HTTP server to smuggle out files, so I spun up an AWS box and ran a simple Python webserver to receive the traffic from the vulnerable server:
python3 -m http.server 8000
Serving HTTP on 0.0.0.0 port 8000 (http://0.0.0.0:8000/) ...
Once the webserver was running, I sent a cURL request from my home computer to make sure that it ...
Read more at samcurry.net