Post 20 - Playing Catchup

22 Dec 2022

Task 25, Day 20, Firmware Binwalkin’ around the Christmas tree

Focusing on firmware reverse engineering from a security standpoint. It’s possible a smart watch could have firmware programmed to send all incoming messages, emails, etc. to a specific IP unbeknownst to the user. Steps to follow:

Types of Analyisis

Static

Essential examination of the binary file contents, performing its reverse engineering, and reading assembly instructions to understand functionality. Commonly used command line utilities and binary analysis tools include:

Dynamic

Involves running the firmware code on actual hardware and observing its behavior through emulation and hardware/software based debugging. Significant advantages include analyzing unintended network communication for identifying data prilfering. Common tools used:

The Task

Find a flag and some data on the device’s firmware.

Started with binwalk -E -N Binwalk entropy analysis without plotting entropy graph. Returned sing entry with rising entropy edge. Same process on unsigned returned multiple entries alternating between falling and rising entropy edges. (Should research more to see what that means)

Next used FMK extract-firmware.sh on older unencrypted version of firmware. Follow up by using grep -ir to search extracted files for gpg keys using case insensitive and recursive flags.

Flag and info found.