Nowadays Firmware Development - Distribution/ Device Upload
6
Nowadays Firmware Development - Extract Firmware from Devices
7
All Beginnings are Difficult
8
Preparations
9
Locate the Root File System
10
Identify the Architecture
11
Libraries are Relevant!
12
Script Preparation
13
Pre-Analysis - Sample Set of (Almost) 200 Firmwares across 49 Vend
14
Preparing Fake Images - Buildroot to the Rescue!
15
Preparing Fake Images - Covered Architectures
16
Monitoring and Debugging
17
Study Samples from...
18
Study Outcome of Linux Based Firmware Emulation
19
Command Injection in Phoenix Contact Devices - Analysis
20
Conclusion and Further Work
Description:
Explore advanced techniques for emulating and analyzing embedded system firmware in this comprehensive conference talk from the Hack In The Box Security Conference. Delve into methods for automating firmware emulation across various architectures without modifying the Linux kernel. Learn how to locate file system roots, determine instruction sets, and emulate target firmware using simple scripts and open-source components. Gain insights into the security implications of the growing number of embedded devices, including network cameras, routers, and programmable logic controllers (PLCs). Discover practical approaches to dissecting hardware and extracted firmware, drawing from real-world examples and research projects. Examine case studies, including a command injection vulnerability in Phoenix Contact devices, and understand the outcomes of Linux-based firmware emulation studies. Benefit from the expertise of Thomas Weber, a seasoned security researcher specializing in embedded device security and reverse engineering.
Read more