<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://www.router-recovery.com/wiki/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://www.router-recovery.com/wiki/feed.php">
        <title>Router Recovery Wiki - technique</title>
        <description></description>
        <link>https://www.router-recovery.com/wiki/</link>
        <image rdf:resource="https://www.router-recovery.com/wiki/lib/exe/fetch.php?media=wiki:dokuwiki.svg" />
       <dc:date>2026-04-14T07:18:21+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://www.router-recovery.com/wiki/tutorial.php?id=technique:firmware-modification&amp;rev=1776001364&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.router-recovery.com/wiki/tutorial.php?id=technique:security-bypass&amp;rev=1776001364&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://www.router-recovery.com/wiki/lib/exe/fetch.php?media=wiki:dokuwiki.svg">
        <title>Router Recovery Wiki</title>
        <link>https://www.router-recovery.com/wiki/</link>
        <url>https://www.router-recovery.com/wiki/lib/exe/fetch.php?media=wiki:dokuwiki.svg</url>
    </image>
    <item rdf:about="https://www.router-recovery.com/wiki/tutorial.php?id=technique:firmware-modification&amp;rev=1776001364&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-04-12T13:42:44+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>firmware-modification</title>
        <link>https://www.router-recovery.com/wiki/tutorial.php?id=technique:firmware-modification&amp;rev=1776001364&amp;do=diff</link>
        <description>固件修改技术

固件修改可以解锁更多功能、去除限制、安装第三方固件。

固件解包

使用 binwalk

```bash
# 分析固件结构
binwalk firmware.bin

# 提取固件内容
binwalk -e firmware.bin

# 自动识别并提取
binwalk -eM firmware.bin
```</description>
    </item>
    <item rdf:about="https://www.router-recovery.com/wiki/tutorial.php?id=technique:security-bypass&amp;rev=1776001364&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-04-12T13:42:44+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>security-bypass</title>
        <link>https://www.router-recovery.com/wiki/tutorial.php?id=technique:security-bypass&amp;rev=1776001364&amp;do=diff</link>
        <description>安全绕过技术

某些路由器有安全机制限制刷机，可以通过以下方法绕过。

常见安全机制

1. 固件签名验证

* 路由器校验固件签名
* 签名不匹配的固件无法刷入

绕过方法：
* 使用有签名的修改固件
* 通过 Breed/U-Boot 刷入（绕过校验）
* 漏洞利用获取 root</description>
    </item>
</rdf:RDF>
