TOOLS

https://github.com/attify/firmware-analysis-toolkit

$ ./fat.py DIR-601_REVB_FIRMWARE_2.01.BIN 
 
                               __           _   
                              / _|         | |  
                             | |_    __ _  | |_ 
                             |  _|  / _` | | __|
                             | |   | (_| | | |_ 
                             |_|    \__,_|  \__|                    
                    
                Welcome to the Firmware Analysis Toolkit - v0.3
    Offensive IoT Exploitation Training http://bit.do/offensiveiotexploitation
                  By Attify - https://attify.com  | @attifyme
    
[+] Firmware: DIR-601_REVB_FIRMWARE_2.01.BIN
[+] Extracting the firmware...
[+] Image ID: 1
[+] Identifying architecture...
[+] Architecture: mipseb
[+] Building QEMU disk image...
[+] Setting up the network connection, please standby...
[+] Network interfaces: [('br0', '192.168.0.1')]
[+] All set! Press ENTER to run the firmware...
[+] When running, press Ctrl + A X to terminate qemu

The security analyzer for firmware of embedded devices.

https://github.com/e-m-b-a/emba

OFRAK: unpack, modify, and repack binaries.

https://github.com/redballoonsecurity/ofrak

https://ofrak.com/


CONTENT:

https://www.ringzerolabs.com/2018/03/the-wonderful-world-of-mips.html

Reverse Engineering an Unknown Microcontroller:

https://dmitry.gr/?r=05.Projects&proj=30.%20Reverse%20Engineering%20an%20Unknown%20Microcontroller


🌱 Back to Garden