Buyisa ubunjineli kwirutha yasekhaya usebenzisa i-binwalk. Ngaba uyayithemba isoftware yakho yerouter?

Buyisa ubunjineli kwirutha yasekhaya usebenzisa i-binwalk. Ngaba uyayithemba isoftware yakho yerouter?

Kwiintsuku ezimbalwa ezidlulileyo, ndaye ndagqiba ekubeni ndibuyisele umva injineli ye-firmware ye-router yam usebenzisa i-binwalk.

Ndazithenga I-TP-Link Archer C7 irutha yasekhaya. Ayisiyiyo eyona router ilungileyo, kodwa yanele iimfuno zam.

Ngalo lonke ixesha ndithenga i-router entsha, ndiyafaka I-OpenWRT. Yantoni? Njengomthetho, abavelisi abakhathaleli kakhulu malunga nokuxhasa ii-routers zabo kwaye ngokuhamba kwexesha isoftware iba yidala, ubuthathaka buvela, njalo njalo, ngokubanzi, ufumana umbono. Ke ngoko, ndikhetha i-firmware ye-OpenWRT, exhaswa kakuhle luluntu oluvulelekileyo.

Emva kokukhuphela i-OpenWRT, nam ukhuphele umfanekiso wefirmware yamva nje phantsi kweArcher C7 yam entsha evela kwiwebhusayithi esemthethweni kwaye ndagqiba ekubeni ndiyihlalutye. Ngokukodwa ukuzonwabisa kwaye uthethe nge-binwalk.

Yintoni ibinwalk?

Binwalk sisixhobo somthombo ovulekileyo sokuhlalutya, ukubuyisela umva ubunjineli kunye nokutsalwa komfanekiso we-firmware.

Idalwe ngo-2010 nguCraig Heffner, i-binwalk inokuskena imifanekiso ye-firmware kwaye ifumane iifayile, ichonge kwaye ikhuphe imifanekiso yefayile yefayile, ikhowudi ephunyeziweyo, i-archives ecinezelweyo, i-bootloaders kunye ne-kernels, iifomati zefayile ezifana neJPEG kunye nePDF, kunye nokunye okuninzi.

Ungasebenzisa i-binwalk ukubuyisela umva injineli ye-firmware ukuqonda ukuba isebenza njani. Khangela iifayile zokubini zobuthathaka, ukhuphe iifayile, kwaye ujonge umva okanye izatifikethi zedijithali. Ungafumana kwakhona opcodes ngenxa yeqela le-CPU ezahlukeneyo.

Unako ukukhupha imifanekiso yenkqubo yefayile ukujonga iifayile ezithile zegama lokugqitha (passwd, shadow, etc.) kwaye uzame ukwaphula i-password hash. Unokwenza ulwahlulo lokubini phakathi kweefayile ezimbini nangaphezulu. Unokwenza uhlalutyo lwe-entropy kwidatha ukujonga idatha ecinezelweyo okanye izitshixo ezifihliweyo. Konke oku ngaphandle kwesidingo sokufikelela kwikhowudi yomthombo.

Ngokubanzi, yonke into oyifunayo ikhona :)

Isebenza njani i-binwalk?

Inqaku eliphambili le-binwalk kukusayinwa kwayo. I-Binwalk inokuskena umfanekiso we-firmware ukukhangela iintlobo ezahlukeneyo zefayile ezakhelwe ngaphakathi kunye neenkqubo zefayile.

Ngaba uyayazi into eluncedo yomgca womyalelo file?

file /bin/bash
/bin/bash: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/l, for GNU/Linux 3.2.0, BuildID[sha1]=12f73d7a8e226c663034529c8dd20efec22dde54, stripped

Iqela fileijonga iheader yefayile kwaye ijonge utyikityo (inombolo yomlingo) ukumisela uhlobo lwefayile. Umzekelo, ukuba ifayile iqala ngokulandelelana kwee-bytes 0x89 0x50 0x4E 0x47 0x0D 0x0A 0x1A 0x0A, iyayazi ukuba yifayile yePNG. Vula I-Wikipedia Kukho uluhlu lweefayile eziqhelekileyo zosayino.

I-Binwalk isebenza ngendlela efanayo. Kodwa endaweni yokujonga imisayino kuphela ekuqaleni kwefayile, i-binwalk iya kuskena yonke ifayile. Ukongezelela, i-binwalk inokukhupha iifayile ezifunyenwe kumfanekiso.

Zixhobo file ΠΈ binwalk sebenzisa ithala leencwadi libmagic ukuchonga imisayino yeefayile. Kodwa binwalk ukongeza ixhasa uluhlu lwemisayino yomlingo yesiko ukukhangela iifayile ezixinzelelweyo/ezivaliweyo, iiheader ze-firmware, ii-Linux kernels, ii-bootloaders, iinkqubo zefayile njalo njalo.

Masiyonwabele?

Ukufakwa kweBinwalk

I-Binwalk ixhaswa kumaqonga amaninzi aquka iLinux, i-OSX, iFreeBSD kunye neWindows.

Ukufakela inguqulelo yamva nje ye-binwalk unako Khuphela ikhowudi yemvelaphi kwaye ulandele imiyalelo yokufaka okanye isikhokelo esikhawulezayo, ekhoyo kwiwebhusayithi yeprojekthi.

I-Binwalk ineeparamitha ezininzi ezahlukeneyo:

$ binwalk

Binwalk v2.2.0
Craig Heffner, ReFirmLabs
https://github.com/ReFirmLabs/binwalk

Usage: binwalk [OPTIONS] [FILE1] [FILE2] [FILE3] ...

Signature Scan Options:
    -B, --signature              Scan target file(s) for common file signatures
    -R, --raw=<str>              Scan target file(s) for the specified sequence of bytes
    -A, --opcodes                Scan target file(s) for common executable opcode signatures
    -m, --magic=<file>           Specify a custom magic file to use
    -b, --dumb                   Disable smart signature keywords
    -I, --invalid                Show results marked as invalid
    -x, --exclude=<str>          Exclude results that match <str>
    -y, --include=<str>          Only show results that match <str>

Extraction Options:
    -e, --extract                Automatically extract known file types
    -D, --dd=<type:ext:cmd>      Extract <type> signatures, give the files an extension of <ext>, and execute <cmd>
    -M, --matryoshka             Recursively scan extracted files
    -d, --depth=<int>            Limit matryoshka recursion depth (default: 8 levels deep)
    -C, --directory=<str>        Extract files/folders to a custom directory (default: current working directory)
    -j, --size=<int>             Limit the size of each extracted file
    -n, --count=<int>            Limit the number of extracted files
    -r, --rm                     Delete carved files after extraction
    -z, --carve                  Carve data from files, but don't execute extraction utilities
    -V, --subdirs                Extract into sub-directories named by the offset

Entropy Options:
    -E, --entropy                Calculate file entropy
    -F, --fast                   Use faster, but less detailed, entropy analysis
    -J, --save                   Save plot as a PNG
    -Q, --nlegend                Omit the legend from the entropy plot graph
    -N, --nplot                  Do not generate an entropy plot graph
    -H, --high=<float>           Set the rising edge entropy trigger threshold (default: 0.95)
    -L, --low=<float>            Set the falling edge entropy trigger threshold (default: 0.85)

Binary Diffing Options:
    -W, --hexdump                Perform a hexdump / diff of a file or files
    -G, --green                  Only show lines containing bytes that are the same among all files
    -i, --red                    Only show lines containing bytes that are different among all files
    -U, --blue                   Only show lines containing bytes that are different among some files
    -u, --similar                Only display lines that are the same between all files
    -w, --terse                  Diff all files, but only display a hex dump of the first file

Raw Compression Options:
    -X, --deflate                Scan for raw deflate compression streams
    -Z, --lzma                   Scan for raw LZMA compression streams
    -P, --partial                Perform a superficial, but faster, scan
    -S, --stop                   Stop after the first result

General Options:
    -l, --length=<int>           Number of bytes to scan
    -o, --offset=<int>           Start scan at this file offset
    -O, --base=<int>             Add a base address to all printed offsets
    -K, --block=<int>            Set file block size
    -g, --swap=<int>             Reverse every n bytes before scanning
    -f, --log=<file>             Log results to file
    -c, --csv                    Log results to file in CSV format
    -t, --term                   Format output to fit the terminal window
    -q, --quiet                  Suppress output to stdout
    -v, --verbose                Enable verbose output
    -h, --help                   Show help output
    -a, --finclude=<str>         Only scan files whose names match this regex
    -p, --fexclude=<str>         Do not scan files whose names match this regex
    -s, --status=<int>           Enable the status server on the specified port

Ukuskena umfanekiso

Masiqale ngokukhangela utyikityo lwefayile ngaphakathi komfanekiso (umfanekiso osuka kwindawo TP-Link).

Ukubaleka i-binwalk nge---signature parameter:

$ binwalk --signature --term archer-c7.bin

DECIMAL       HEXADECIMAL     DESCRIPTION
------------------------------------------------------------------------------------------
21876         0x5574          U-Boot version string, "U-Boot 1.1.4-g4480d5f9-dirty (May
                              20 2019 - 18:45:16)"
21940         0x55B4          CRC32 polynomial table, big endian
23232         0x5AC0          uImage header, header size: 64 bytes, header CRC:
                              0x386C2BD5, created: 2019-05-20 10:45:17, image size:
                              41162 bytes, Data Address: 0x80010000, Entry Point:
                              0x80010000, data CRC: 0xC9CD1E38, OS: Linux, CPU: MIPS,
                              image type: Firmware Image, compression type: lzma, image
                              name: "u-boot image"
23296         0x5B00          LZMA compressed data, properties: 0x5D, dictionary size:
                              8388608 bytes, uncompressed size: 97476 bytes
64968         0xFDC8          XML document, version: "1.0"
78448         0x13270         uImage header, header size: 64 bytes, header CRC:
                              0x78A267FF, created: 2019-07-26 07:46:14, image size:
                              1088500 bytes, Data Address: 0x80060000, Entry Point:
                              0x80060000, data CRC: 0xBB9D4F94, OS: Linux, CPU: MIPS,
                              image type: Multi-File Image, compression type: lzma,
                              image name: "MIPS OpenWrt Linux-3.3.8"
78520         0x132B8         LZMA compressed data, properties: 0x6D, dictionary size:
                              8388608 bytes, uncompressed size: 3164228 bytes
1167013       0x11CEA5        Squashfs filesystem, little endian, version 4.0,
                              compression:xz, size: 14388306 bytes, 2541 inodes,
                              blocksize: 65536 bytes, created: 2019-07-26 07:51:38
15555328      0xED5B00        gzip compressed data, from Unix, last modified: 2019-07-26
                              07:51:41

Ngoku sinolwazi oluninzi malunga nalo mfanekiso.

Ukusetyenziswa komfanekiso Inkwili njenge-bootloader (iheader yomfanekiso kwi 0x5AC0 kunye nomfanekiso we-bootloader ocinezelweyo kwi 0x5B00). Ngokusekwe kwi-header ye-uImage kwi-0x13270, siyazi ukuba iprosesa ye-architecture yi-MIPS kunye ne-Linux kernel yinguqulo 3.3.8. Kwaye ngokusekelwe kumfanekiso ofunyenwe kwidilesi 0x11CEA5, siyayibona loo nto rootfs yinkqubo yefayile squashfs.

Ngoku makhe sikhuphe i-bootloader (U-Boot) sisebenzisa umyalelo dd:

$ dd if=archer-c7.bin of=u-boot.bin.lzma bs=1 skip=23296 count=41162
41162+0 records in
41162+0 records out
41162 bytes (41 kB, 40 KiB) copied, 0,0939608 s, 438 kB/s

Kuba umfanekiso ucinezelwe kusetyenziswa i-LZMA, kufuneka siwucinezele:

$ unlzma u-boot.bin.lzma

Ngoku sinomfanekiso we-U-Boot:

$ ls -l u-boot.bin
-rw-rw-r-- 1 sprado sprado 97476 Fev  5 08:48 u-boot.bin

Kunjani ngokufumana ixabiso elimiselweyo le bootargs?

$ strings u-boot.bin | grep bootargs
bootargs
bootargs=console=ttyS0,115200 board=AP152 rootfstype=squashfs init=/etc/preinit mtdparts=spi0.0:128k(factory-uboot),192k(u-boot),64k(ART),1536k(uImage),14464k@0x1e0000(rootfs) mem=128M

I-U-Boot Environment Variable bootargs isetyenziselwa ukudlulisa iiparameters kwi Linux kernel. Kwaye ukusuka ngasentla, sinokuqonda ngcono imemori ye-flash yesixhobo.

Kuthekani ngokukhupha umfanekiso we-Linux kernel?

$ dd if=archer-c7.bin of=uImage bs=1 skip=78448 count=1088572
1088572+0 records in
1088572+0 records out
1088572 bytes (1,1 MB, 1,0 MiB) copied, 1,68628 s, 646 kB/s

Sinokujonga ukuba umfanekiso ukhutshwe ngempumelelo ngokusebenzisa umyalelo file:

$ file uImage
uImage: u-boot legacy uImage, MIPS OpenWrt Linux-3.3.8, Linux/MIPS, Multi-File Image (lzma), 1088500 bytes, Fri Jul 26 07:46:14 2019, Load Address: 0x80060000, Entry Point: 0x80060000, Header CRC: 0x78A267FF, Data CRC: 0xBB9D4F94

Ifomathi yefayile ye-uImage ngokusisiseko ngumfanekiso we-Linux kernel enesihloko esongezelelweyo. Masisuse le ntloko ukuze sifumane umfanekiso wokugqibela we-Linux kernel:

$ dd if=uImage of=Image.lzma bs=1 skip=72
1088500+0 records in
1088500+0 records out
1088500 bytes (1,1 MB, 1,0 MiB) copied, 1,65603 s, 657 kB/s

Umfanekiso ucinezelekile, ngoko ke masiwukhuphe:

$ unlzma Image.lzma

Ngoku sinomfanekiso we-Linux kernel:

$ ls -la Image
-rw-rw-r-- 1 sprado sprado 3164228 Fev  5 10:51 Image

Singenza ntoni ngomfanekiso wekernel? Singenza, umzekelo, ukukhangela umtya emfanekisweni kwaye sifumane inguqulelo ye-Linux kernel kwaye sifunde malunga nokusingqongileyo okusetyenziselwa ukwakha ikernel:

$ strings Image | grep "Linux version"
Linux version 3.3.8 (leo@leo-MS-7529) (gcc version 4.6.3 20120201 (prerelease) (Linaro GCC 4.6-2012.02) ) #1 Mon May 20 18:53:02 CST 2019

Nangona i-firmware yakhululwa kulo nyaka uphelileyo (2019), njengoko ndibhala eli nqaku isebenzisa inguqulo yakudala ye-Linux kernel (3.3.8) ekhutshwe ngo-2012, ihlanganiswe nohlobo oludala kakhulu lwe-GCC (4.6) ukususela ngo-2012. !
(approx. transl. ingaba usazithemba iirotha zakho eofisini nasekhaya?)

Ngokhetho --opcodes Sinokusebenzisa i-binwalk ukujonga imiyalelo yomatshini kunye nokumisela iprosesa yoyilo lomfanekiso:

$ binwalk --opcodes Image
DECIMAL       HEXADECIMAL     DESCRIPTION
--------------------------------------------------------------------------------
2400          0x960           MIPS instructions, function epilogue
2572          0xA0C           MIPS instructions, function epilogue
2828          0xB0C           MIPS instructions, function epilogue

Kuthekani ngenkqubo yefayile yeengcambu? Endaweni yokukhupha umfanekiso ngesandla, masisebenzise ukhetho binwalk --extract:

$ binwalk --extract --quiet archer-c7.bin

Inkqubo yefayile yeengcambu epheleleyo iya kutsalwa kulawulo olusezantsi:

$ cd _archer-c7.bin.extracted/squashfs-root/

$ ls
bin  dev  etc  lib  mnt  overlay  proc  rom  root  sbin  sys  tmp  usr  var  www

$ cat etc/banner
     MM           NM                    MMMMMMM          M       M
   $MMMMM        MMMMM                MMMMMMMMMMM      MMM     MMM
  MMMMMMMM     MM MMMMM.              MMMMM:MMMMMM:   MMMM   MMMMM
MMMM= MMMMMM  MMM   MMMM       MMMMM   MMMM  MMMMMM   MMMM  MMMMM'
MMMM=  MMMMM MMMM    MM       MMMMM    MMMM    MMMM   MMMMNMMMMM
MMMM=   MMMM  MMMMM          MMMMM     MMMM    MMMM   MMMMMMMM
MMMM=   MMMM   MMMMMM       MMMMM      MMMM    MMMM   MMMMMMMMM
MMMM=   MMMM     MMMMM,    NMMMMMMMM   MMMM    MMMM   MMMMMMMMMMM
MMMM=   MMMM      MMMMMM   MMMMMMMM    MMMM    MMMM   MMMM  MMMMMM
MMMM=   MMMM   MM    MMMM    MMMM      MMMM    MMMM   MMMM    MMMM
MMMM$ ,MMMMM  MMMMM  MMMM    MMM       MMMM   MMMMM   MMMM    MMMM
  MMMMMMM:      MMMMMMM     M         MMMMMMMMMMMM  MMMMMMM MMMMMMM
    MMMMMM       MMMMN     M           MMMMMMMMM      MMMM    MMMM
     MMMM          M                    MMMMMMM        M       M
       M
 ---------------------------------------------------------------
   For those about to rock... (%C, %R)
 ---------------------------------------------------------------

Ngoku sinokwenza izinto ezininzi ezahlukeneyo.

Sinokukhangela iifayile zokumisela, i-password hashes, izitshixo ze-cryptographic kunye nezatifikethi zedijithali. Sinokuhlalutya iifayile zokubini ze ukulungisa ingxaki kunye nobuthathaka.

Ngo kunceda ngubani ΠΈ chroot sinokuqhuba (ukulinganisa) okuphunyeziweyo kumfanekiso:

$ ls
bin  dev  etc  lib  mnt  overlay  proc  rom  root  sbin  sys  tmp  usr  var  www

$ cp /usr/bin/qemu-mips-static .

$ sudo chroot . ./qemu-mips-static bin/busybox
BusyBox v1.19.4 (2019-05-20 18:13:49 CST) multi-call binary.
Copyright (C) 1998-2011 Erik Andersen, Rob Landley, Denys Vlasenko
and others. Licensed under GPLv2.
See source distribution for full notice.

Usage: busybox [function] [arguments]...
   or: busybox --list[-full]
   or: function [arguments]...

    BusyBox is a multi-call binary that combines many common Unix
    utilities into a single executable.  Most people will create a
    link to busybox for each function they wish to use and BusyBox
    will act like whatever it was invoked as.

Currently defined functions:
    [, [[, addgroup, adduser, arping, ash, awk, basename, cat, chgrp, chmod, chown, chroot, clear, cmp, cp, crond, crontab, cut, date, dd, delgroup, deluser, dirname, dmesg, echo, egrep, env, expr, false,
    fgrep, find, free, fsync, grep, gunzip, gzip, halt, head, hexdump, hostid, id, ifconfig, init, insmod, kill, killall, klogd, ln, lock, logger, ls, lsmod, mac_addr, md5sum, mkdir, mkfifo, mknod, mktemp,
    mount, mv, nice, passwd, pgrep, pidof, ping, ping6, pivot_root, poweroff, printf, ps, pwd, readlink, reboot, reset, rm, rmdir, rmmod, route, sed, seq, sh, sleep, sort, start-stop-daemon, strings,
    switch_root, sync, sysctl, tail, tar, tee, telnet, test, tftp, time, top, touch, tr, traceroute, true, udhcpc, umount, uname, uniq, uptime, vconfig, vi, watchdog, wc, wget, which, xargs, yes, zcat

Kakhulu! Kodwa nceda uqaphele ukuba inguqulo ye-BusyBox yi-1.19.4. Olu luguqulelo oludala kakhulu lweBusyBox, eyakhutshwa ngoAprili 2012.

Ngoko i-TP-Link ikhupha umfanekiso we-firmware kwi-2019 usebenzisa isofthiwe (i-GCC toolchain, i-kernel, i-BusyBox, njl.) ukusuka kwi-2012!

Ngoku uyasiqonda isizathu sokuba ndisoloko ndifaka i-OpenWRT kwiirotha zam?

Akunjalo kuphela

I-Binwalk inokwenza uhlalutyo lwe-entropy, iprinte idatha ye-entropy eluhlaza, kwaye ivelise iigrafu ze-entropy. Ngokuqhelekileyo, i-entropy enkulu ijongwa xa ii-bytes emfanekisweni zingakhethi. Oku kunokuthetha ukuba umfanekiso uqulathe uguqulelo oluntsonkothileyo, olucinezelweyo, okanye ifayile efihliweyo. Iqhosha loguqulelo oluntsonkothileyo? Ngoba kutheni.

Buyisa ubunjineli kwirutha yasekhaya usebenzisa i-binwalk. Ngaba uyayithemba isoftware yakho yerouter?

Sinokusebenzisa ipharamitha --raw ukufumana i-byte ekrwada yolandelelwano kumfanekiso okanye iparameter --hexdump ukwenza i-hex dump ethelekisa ezimbini nangaphezulu iifayile zongeniso.

Imisayino yesiko ingongezwa kwi-binwalk mhlawumbi ngefayile yesiko lotyikityo ekhankanyiweyo kumgca womyalelo usebenzisa iparameter --magic, okanye ngokuzongeza kulawulo $ HOME / .config / binwalk / magic.

Unokufumana ulwazi oluninzi malunga ne-binwalk amaxwebhu asemthethweni.

binwalk extension

Kukho API ibhinwalk, iphunyezwe njengemodyuli yePython enokuthi isetyenziswe nasiphi na iskripthi sePython ukwenza ngokwenkqubo i-binwalk scan, kwaye usetyenziso lomgca we-binwalk lunokuba luphindwe ngokupheleleyo ngemigca emibini nje yekhowudi yePython!

import binwalk
binwalk.scan()

Ukusebenzisa iPython API unokwenza kwakhona Iiplagi zePython ukuqwalasela kunye nokwandisa i-binwalk.

Kukho kwakhona IDA iplagi kunye nenguqulo yelifu Binwalk Pro.

Ke kutheni ungakhupheli umfanekiso we-firmware kwi-Intanethi kwaye uzame i-binwalk? Ndiyathembisa ukuba uya konwaba kakhulu :)

umthombo: www.habr.com

Yongeza izimvo