Firmadyne
Platform for emulation and dynamic analysis of Linux-based firmware
Install / Use
/learn @firmadyne/FirmadyneREADME
Table of Contents
Introduction
FIRMADYNE is an automated and scalable system for performing emulation and dynamic analysis of Linux-based embedded firmware. It includes the following components:
- modified kernels (MIPS: v2.6, ARM: v4.1, v3.10) for instrumentation of firmware execution;
- a userspace NVRAM library to emulate a hardware NVRAM peripheral;
- an extractor to extract a filesystem and kernel from downloaded firmware;
- a small console application to spawn an additional shell for debugging;
- and a scraper to download firmware from 42+ different vendors.
We have also written the following three basic automated analyses using the FIRMADYNE system.
- Accessible Webpages: This script iterates through each file within the filesystem of a firmware image that appears to be served by a webserver, and aggregates the results based on whether they appear to required authentication.
- SNMP Information: This script dumps the contents of the
publicandprivateSNMP v2c communities to disk using no credentials. - Vulnerability Check: This script tests for the presence of 60 known vulnerabilities using exploits from Metasploit. In addition, it also checks for 14 previously-unknown vulnerabilities that we discovered. For more information, including affected products and CVE's, refer to analyses/README.md.
In our 2016 Network and Distributed System Security Symposium (NDSS) paper, titled Towards Automated Dynamic Analysis for Linux-based Embedded Firmware, we evaluated the FIRMADYNE system over a dataset of 23,035 firmware images, of which we were able to extract 9,486. Using 60 exploits from the Metasploit Framework, and 14 previously-unknown vulnerabilities that we discovered, we showed that 846 out of 1,971 (43%) firmware images were vulnerable to at least one exploit, which we estimate to affect 89+ different products. For more details, refer to our paper linked above.
Note: This project is a research tool, and is currently not production ready. In particular, some components are quite immature and rough. We suggest running the system within a virtual machine. No support is offered, but pull requests are greatly appreciated, whether for documentation, tests, or code!
Setup
First, clone this repository recursively and install its dependencies.
sudo apt-get install busybox-static fakeroot git dmsetup kpartx netcat-openbsd nmap python-psycopg2 python3-psycopg2 snmp uml-utilities util-linux vlangit clone --recursive https://github.com/firmadyne/firmadyne.git
Extractor
The extractor depends on the binwalk tool, so we need to install that and its dependencies.
git clone https://github.com/ReFirmLabs/binwalk.gitcd binwalksudo ./deps.shsudo python ./setup.py install
- For Python 2.x,
sudo apt-get install python-lzma
sudo -H pip install git+https://github.com/ahupp/python-magicsudo -H pip install git+https://github.com/sviehb/jefferson.- Optionally, instead of upstream sasquatch, our sasquatch fork can be used to prevent false positives by making errors fatal.
Database
Next, install, set up, and configure the database.
sudo apt-get install postgresqlsudo -u postgres createuser -P firmadyne, with passwordfirmadynesudo -u postgres createdb -O firmadyne firmwaresudo -u postgres psql -d firmware < ./firmadyne/database/schema
Binaries
To download our pre-built binaries for all components, run the following script:
cd ./firmadyne; ./download.sh
Alternatively, refer to the instructions below to compile from source.
QEMU
To use QEMU provided by your distribution:
sudo apt-get install qemu-system-arm qemu-system-mips qemu-system-x86 qemu-utils
Note that emulation of x86-based firmware is not currently supported, but installing
qemu-system-x86 resolves a packaging issue on certain Debian-based distributions.
Alternatively, use our modified version
of qemu-linaro for certain
firmware with an alphafs webserver that assumes a fixed memory mapping (not
recommended), or upstream qemu.
Usage
- Set
FIRMWARE_DIRinfirmadyne.configto point to the root of this repository. - Download a firmware image, e.g. v2.0.3 for Netgear WNAP320.
wget http://www.downloads.netgear.com/files/GDC/WNAP320/WNAP320%20Firmware%20Version%202.0.3.zip
- Use the extractor to recover only the filesystem, no kernel (
-nk), no parallel operation (-np), populating theimagetable in the SQL server at127.0.0.1(-sql) with theNetgearbrand (-b), and storing the tarball inimages../sources/extractor/extractor.py -b Netgear -sql 127.0.0.1 -np -nk "WNAP320 Firmware Version 2.0.3.zip" images
- Identify the architecture of firmware
1and store the result in theimagetable of the database../scripts/getArch.sh ./images/1.tar.gz
- Load the contents of the filesystem for firmware
1into the database, populating theobjectandobject_to_imagetables../scripts/tar2db.py -i 1 -f ./images/1.tar.gz
- Create the QEMU disk image for firmware
1.sudo ./scripts/makeImage.sh 1
- Infer the network configuration for firmware
1. Kernel messages are logged to./scratch/1/qemu.initial.serial.log../scripts/inferNetwork.sh 1
- Emulate firmware
1with the inferred network configuration. This will modify the configuration of the host system by creating a TAP device and adding a route../scratch/1/run.sh
- The system should be available over the network, and is ready for analysis. Kernel messages are mirrored to
./scratch/1/qemu.final.serial.log. The filesystem for firmware1can be mounted to and unmounted fromscratch/1/imagewith./scripts/mount.sh 1and./scripts/umount.sh 1../analyses/snmpwalk.sh 192.168.0.100./analyses/webAccess.py 1 192.168.0.100 log.txtmkdir exploits; ./analyses/runExploits.py -t 192.168.0.100 -o exploits/exploit -e x(requires Metasploit Framework)sudo nmap -O -sV 192.168.0.100
- The default console should be automatically connected to the terminal. You may also login with
rootandpassword. Note thatCtrl-cis sent to the guest; use the QEMU monitor commandCtrl-a + xto terminate emulation.
FAQ
run.sh is not generated
This is a common error that is encountered when the network configuration is unable to be inferred. Follow the checklist below to figure out the cause.
inferNetwork.sh: Did this script find any network interfaces (e.g.Interfaces: [br0, 192.168.0.1])? If so, this is a bug; please report it. Otherwise, continue below.qemu.initial.serial.log: Does this file end withUnable to mount root fs on unknown-block(8,1)? If so, the initial filesystem image was not generated correctly usingkpartx. Try deleting the scratch directory corresponding to this firmware image, and restart atmakeImage.sh. Otherwise, the initial emulation didn't produce any useful instrumentation. Try increasing the timeout ininferNetwork.shfrom60to120and restarting atinferNetwork.sh.qemu.initial.serial.log: Did theinitprocess crash, and is this preceded by a failed NVRAM operation (e.g.nvram_get_buf: Unable to open key <foo>)? If so, see the FAQ entries below.
Log ends with "Kernel panic - not syncing: No working init found"
The firmware uses an initialization process with an unusual name. You'll need to manually inspect the filesystem to identify the correct one, then modify the script to specify its full path by appending a kernel boot parameter init=<path> to QEMU.
A process crashed, e.g. do_page_fault() #2: sending SIGSEGV for invalid read access from 00000000
It is likely that the process requested a NVRAM entry that FIRMADYNE does not have a default value for. This can be fixed by manually adding a source for NVRAM entries to NVRAM_DEFAULTS_PATH, an entry to NVRAM_DEFAULTS, or a file to OVERRIDE_POINT in libnvram. For more details, see the [documentation for libnvram](https://github.c
