FIRMADYNE — Linux Embedded Firmware Dynamic Analysis
iSpeech
FIRMADYNE is an automated and scalable system for performing emulation and dynamic analysis of Linux-based embedded firmware. It includes the following components:
- modified kernels (MIPS: v2.6.32, ARM: v4.1, v3.10) for instrumentation of firmware execution;
- a userspace NVRAM library to emulate a hardware NVRAM peripheral;
- an extractor to extract a filesystem and kernel from downloaded firmware;
- a small console application to spawn an additional shell for debugging;
- and a scraper to download firmware from 42+ different vendors.
There are also three basic automated analyses using the FIRMADYNE system.
- Accessible Webpages: This script iterates through each file within the filesystem of a firmware image that appears to be served by a webserver, and aggregates the results based on whether they appear to required authentication.
- SNMP Information: This script dumps the contents of the public and private SNMP v2c communities to disk using no credentials.
- Vulnerability Check: This script tests for the presence of 74 vulnerabilities using exploits from Metasploit and other sources.
In 2016 Network and Distributed System Security Symposium (NDSS) paper, titled Towards Automated Dynamic Analysis for Linux-based Embedded Firmware, team evaluated the FIRMADYNE system over a dataset of 23,035 firmware images, of which they were able to extract 9,486. Using 60 exploits from theMetasploit Framework, and 14 previously-unknown vulnerabilities were discovered, showing that 846 out of 1,971 (43%) firmware images were vulnerable to at least one exploit, affecting 89+ different products. For more details, refer to the paper linked above.
[adsense size='1']
Note: This project is a research tool, and is currently not production ready. In particular, some components are quite immature and rough. It is suggested running the system within a virtual machine. No support is offered, but pull requests are greatly appreciated, whether for documentation, tests, or code!
Install
The following has been tested on a Ubuntu 14.04 machine. Other Debian-based systems should also be compatible. First, clone this repository recursively and install its dependencies.
sudo apt-get install busybox fakeroot git kpartx netcat-openbsd nmap python-psycopg2 python3-psycopg2 snmp uml-utilities util-linux vlan git clone --recursive https://github.com/firmadyne/firmadyne.git
Extractor
The extractor depends on the binwalk tool, so we need to install that and its dependencies.
git clone https://github.com/devttys0/binwalk.git sudo ./binwalk/deps.sh sudo python ./binwalk/setup.py install For Python 2.x, sudo apt-get install python-lzma sudo -H pip install git+https://github.com/ahupp/python-magic
Instead of upstream jefferson, it is recommended to install jefferson fork, which supports extraction of additional file and compression types. Optionally, instead of upstream sasquatch, sasquatch fork can be used to prevent false positives by making errors fatal.
Database
Next, install, set up, and configure the database.
sudo apt-get install postgresql sudo -u postgres createuser -P firmadyne, with password firmadyne sudo -u postgres createdb -O firmadyne firmware sudo -u postgres psql -d firmware < ./firmadyne/database/schema
Binaries
To download pre-built binaries for all components, run the following script:
cd ./firmadyne; ./download.sh
QEMU
To use QEMU provided by your distribution:
sudo apt-get install qemu-system-arm qemu-system-mips qemu-utils
Alternatively, use modified version of qemu-linaro for certain firmware with an alphafs
webserver that assumes a fixed memory mapping (not recommended), or upstream qemu.
[adsense size='4']
Usage
- Set
FIRMWARE_DIR
infirmadyne.config
to point to the root of this repository. - Download a firmware image, e.g. v2.0.3 for Netgear WNAP320.
wget https://www.downloads.netgear.com/files/GDC/WNAP320/WNAP320%20Firmware%20Version%202.0.3.zip
- Use the extractor to recover only the filesystem, no kernel (
-nk
), no parallel operation (-np
), populating theimage
table in the SQL server at127.0.0.1
(-sql
) with theNetgear
brand (-b
), and storing the tarball inimages
../sources/extractor/extractor.py -b Netgear -sql 127.0.0.1 -np -nk "WNAP320 Firmware Version 2.0.3.zip" images
- Identify the architecture of firmware
1
and store the result in theimage
table of the database../scripts/getArch.sh ./images/1.tar.gz
- Load the contents of the filesystem for firmware
1
into the database, populating theobject
andobject_to_image
tables../scripts/tar2db.py -i 1 -f ./images/1.tar.gz
- Create the QEMU disk image for firmware
1
.sudo ./scripts/makeImage.sh 1
- Infer the network configuration for firmware
1
. Kernel messages are logged to./scratch/1/qemu.initial.serial.log
../scripts/inferNetwork.sh 1
- Emulate firmware
1
with the inferred network configuration. This will modify the configuration of the host system by creating a TAP device and adding a route../scratch/1/run.sh
- The system should be available over the network, and is ready for analysis. Kernel messages are logged to
./scratch/1/qemu.final.serial.log
../analyses/snmpwalk.sh 192.168.0.100
./analyses/webAccess.py 1 192.168.0.100 log.txt
mkdir exploits; ./analyses/runExploits.py -t 192.168.0.100 -o exploits/exploit -e x
(requires Metasploit Framework)sudo nmap -O -sV 192.168.0.100
- To access a console in the firmware, use a presupplied debug run script to access the default console (no network access), modify the network-enabled
run.sh
script to provide console access, or use the second console provided by the framework../scripts/run-debug.sh 1
nc -U /tmp/qemu.1.S1
- The following scripts can be used to mount/unmount the filesystem of firmware
1
. Ensure that the emulated firmware is not running, and remember to unmount before performing any other operations.sudo ./scripts/mount.sh 1
sudo ./scripts/umount.sh 1
[adsense size='3']
Gloss