922 B
922 B
Reversing Firmware
Tools
- binwalk
- unlzma
- tar
- fat
- Create usable environment and start firmware inside it
./fat.py <firmware> - Jefferson or AUR package
jefferson-git
Usage
- Check image via
strings - Check CRC via
cksum -a crc <image> - Use
binwalkto extract. There are to methods-eextract by offset--dd=".*"by file extension
Mount JFFS2 File
- Use kernel where
CONFIG_MTD_RAMis set. Using Arch this is any kernel before5.10
rm -rf /dev/mtdblock0
mknod /dev/mtdblock0 b 31 0
mkdir /mnt/jffs2
modprobe jffs2
modprobe mtdram
modprobe mtdblock
dd if=<jffs2File> of=/dev/mtdblock0
mount -t jffs2 /dev/mtdblock0 /mnt/jffs2/
Tips & Tricks
- Watch out for
HNAPandJNAPas an attack vector