Neko

Firmware Hacking

How to obtain and hack firmware.

Last updated: May 4th, 2023

Obtaining

Just Google it

The first step to testing firmware is obtaining it. Oftentimes this as simple as visiting the vendors websites, forums or hobbyist forums.

Dumping from Flash Chips

Sometimes it will require a bit more digging. If the firmware you want to test is on a local device, you can usually open it up and identify the chip containing the firmware. Usually this chip will be small and have eight pins connecting it to the board. Google will be your friend when identifying the chip and what each pin is for. In order to dump the firmware from this point, you'll need a microcontroller that can communicate with SPI chips, such as the Attify Badge. Once you have connected the pins to the microcontroller you will need to connect your microcontroller to your computer. You can use a script like spiflash.py to dump the firmware.

OTA DFU Sniffing

Another scenario where you can grab firmware is by dumping an Over-the-Air Device-Firmware-Update. For this to be viable, the device traffic must be over HTTP if traffic is being captured by a transparent proxy such as Burp. If the device traffic is encrypted then traffic must be captured in a MitM scenario.

Encrypted

XOR

Coming across encrypted firmware is becoming more common. The most common form of encryption for firmware is just a simple XOR. You can identify XOR'd firmware by the repitition of strings when viewing the hexdump

Not XOR

In the case that the firmware is not XOR'd an attacker must perform manual analysis using a disassembler or dump from memory while the firmware is decrypted.

Not Encrypted

Extracting and Analysing

Occasionally, you will obtain unencrypted firmware. This makes analysis quite a bit easier. Running binwalk -e firmware.bin will extract the file system

Hardcoded Secrets

I usually start off by looking for configuration files and identifying any hardcoded credentials or certificates. You can do this manually or with a tool such as firmwalker.

Dissassemble

I like using radare2 to check for strings and functions in the individual binaries of the firmware. You can also use radare to easily search for Xrefs to system(). It may be possible to identify backdoors or injection vulns here too.

Emulation Station

We can emulate the binaries here to allow us to find overflow vulns. sudo chroot . ./qemu-arch -L optional-lib-path -g gdb-port binary.bin will get the binary running and attach it to gdb-multiarch. At this point I set breakpoints at strcmp and other functions. If I find an overflow vulnerability I will usually exploit it using a ROP chain.

Modifying with FMK

Extracting and Backdooring

Using Firmware-Mod-Kit will allow us to upload a modified version of the firmware to the device allowing us to check if there are integrity checks. First we extract the firmware with extract-firmware.sh. Then we can add a backdoor or bindshell to the firmware and build it with ./build-firmware.sh -nopad -min

Uploading

Now we can upload the firmware to the device and determine if there are any integrity checks, if there are, we can try to identify where it's checking for signature verification and see if there is a way to bypass it.

More coming soon.