SlideShare a Scribd company logo
Firmware Extraction &
Fuzzing
Jatan Raval
INTRODUCTION
In this workshop you will learn the different
ways of extracting the firmware and analysing
the firmware.
We will also cover the basic concepts of
remote and guided fuzzing.
My #firmware details
● Jatan K Raval
● Trainer
● M.Tech. in Cyber Security & Incident Response,
GFSU.
● OSCP, OSCE
● Twitter: @jatankraval
WHY DO WE NEED FIRMWARE?
Firmware is a core part which provide
integral functions for the hardware.
It reveals the device architecture and the
process to access the hardware
WHY DO WE ANALYZE THE
FIRMWARE?
VULNERABILITIES SENSITIVE
INFORMATION
QEMU
SHELL
Firmware Extraction
● Serial Console
● Bin file dump
● SSH & Telnet
SERIAL CONSOLE
● Identify the debug pins: Tx, Rx
● Usually the serial console pins are left
for the debug purpose.
● It is used to catch the boot process and
shell.
SERIAL CONSOLE
BIN FILE DUMP
● Dump the bin file from EEPROM
● Tools:
○ HARDSPLOIT
○ RASPBERRY PI
○ Programmer
BIN FILE DUMP
● Identify the EEPROM model.
● Connect the pins or desolder the EEPROM
● Put it in the programmer and read the chip
content.
BIN FILE DUMP
BIN FILE DUMP
BIN FILE DUMP: Raspberry Pi
BIN FILE DUMP: Programmer
● Here we will
extract the
firmware of the IP
Camera.
● Untie the screws
and open the
backpanel
BIN FILE DUMP: Programmer
● Open the back
panel and
identify the
UART pins.
● Identify the
EEPROM
details
BIN FILE DUMP: Programmer
● Identify the
EEPROM
details and
check the
programer
support.
BIN FILE DUMP: Programmer
● Connect SOIC8
Clip to the
EEPROM.
● Download the
datasheet of the
EEPROM.
BIN FILE DUMP: Programmer
● Connect the
pins to the
programmer
and select the
EEPROM
version family in
prgrammer.
BIN FILE DUMP: Programmer
● Dump the
EEPROM
content in a bin
file.
BIN FILE DUMP: Programmer
● Different
programmers
are also
available which
can read the
EEPROM
content.
SSH & Telnet
● Enable the web console from the admin panel.
● Connect to the admin panel using the telnet.
● The SSH service is also enabled on some IoT
devices.

More Related Content

PDF
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
PPTX
Pen Testing Explained
PDF
Nessus Software
PPTX
CISSP - Software Development Security
PPTX
Vulnerability and Assessment Penetration Testing
PPTX
Nessus-Vulnerability Tester
PPTX
Intrusion detection system
PPTX
computer forensic tools-Hardware & Software tools
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Pen Testing Explained
Nessus Software
CISSP - Software Development Security
Vulnerability and Assessment Penetration Testing
Nessus-Vulnerability Tester
Intrusion detection system
computer forensic tools-Hardware & Software tools

What's hot (20)

PPT
Hacking web applications
PPTX
Cyber security
PDF
Access Control Presentation
PPT
Keyloggers
PDF
Embedded Systems Security
PPTX
Inetsecurity.in Ethical Hacking presentation
PPT
Counter Measures Of Virus
PPTX
Introduction to Malware Analysis
PDF
CNIT 141: 8. Authenticated Encryption
PPTX
User authentication
 
PPTX
Security Testing
PPTX
Keyloger & spyware
PPTX
Black box software testing
PPTX
Firmware Reverse Engineering
PPT
Bluetooth security
PDF
What is integration testing
PDF
CISSP Prep: Ch 8. Security Operations
PPTX
Encryption algorithms
PDF
CNIT 127: Ch 18: Source Code Auditing
PDF
Introduction to char device driver
Hacking web applications
Cyber security
Access Control Presentation
Keyloggers
Embedded Systems Security
Inetsecurity.in Ethical Hacking presentation
Counter Measures Of Virus
Introduction to Malware Analysis
CNIT 141: 8. Authenticated Encryption
User authentication
 
Security Testing
Keyloger & spyware
Black box software testing
Firmware Reverse Engineering
Bluetooth security
What is integration testing
CISSP Prep: Ch 8. Security Operations
Encryption algorithms
CNIT 127: Ch 18: Source Code Auditing
Introduction to char device driver
Ad

Similar to Firmware Extraction & Fuzzing - Jatan Raval (20)

PDF
KazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
PDF
Make Your Own Developement Board @ 2014.4.21 JuluOSDev
PDF
HKG18-TR14 - Postmortem Debugging with Coresight
PDF
44CON 2014 - Stupid PCIe Tricks, Joe Fitzpatrick
PDF
From printed circuit boards to exploits
PDF
Infecting the Embedded Supply Chain
PPTX
Micro c lab2(led patterns)
PDF
Lcu14 101- coresight overview
PDF
Nsk products
PDF
Finding Xori: Malware Analysis Triage with Automated Disassembly
PDF
DEF CON 27- JISKA FABIAN - vacuum cleaning security
PDF
Your Peripheral Has Planted Malware—An Exploit of NXP SOCs Vulnerability
PDF
Practical reverse engineering and exploit development for AVR-based Embedded ...
PPTX
FPGA workshop
PDF
ARM IoT Firmware Emulation Workshop
PDF
DevDays: Profiling With Java Flight Recorder
PDF
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
PDF
BKK16-110~---3892hnfi2r8ru94jofmcw8ujd.pdf
PPTX
Hacker bootcamp
PDF
Exploit development 101 - Part 1 - Null Singapore
KazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
Make Your Own Developement Board @ 2014.4.21 JuluOSDev
HKG18-TR14 - Postmortem Debugging with Coresight
44CON 2014 - Stupid PCIe Tricks, Joe Fitzpatrick
From printed circuit boards to exploits
Infecting the Embedded Supply Chain
Micro c lab2(led patterns)
Lcu14 101- coresight overview
Nsk products
Finding Xori: Malware Analysis Triage with Automated Disassembly
DEF CON 27- JISKA FABIAN - vacuum cleaning security
Your Peripheral Has Planted Malware—An Exploit of NXP SOCs Vulnerability
Practical reverse engineering and exploit development for AVR-based Embedded ...
FPGA workshop
ARM IoT Firmware Emulation Workshop
DevDays: Profiling With Java Flight Recorder
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110~---3892hnfi2r8ru94jofmcw8ujd.pdf
Hacker bootcamp
Exploit development 101 - Part 1 - Null Singapore
Ad

More from NSConclave (20)

PDF
RED-TEAM_Conclave
PPTX
Create a Custom Plugin in Burp Suite using the Extension
PPTX
IOT SECURITY ASSESSMENT Pentester's Approach
PPTX
Debugging Android Native Library
PPTX
Burp Suite Extension Development
PDF
Log Analysis
PDF
Regular Expression Injection
PDF
HTML5 Messaging (Post Message)
PDF
Node.js Deserialization
PDF
RIA Cross Domain Policy
PDF
LDAP Injection
PDF
Python Deserialization Attacks
PDF
Sandboxing
PDF
NoSql Injection
PDF
Thick Client Testing Advanced
PDF
Thick Client Testing Basics
PDF
Markdown
PDF
Docker 101
PDF
Security Architecture Consulting - Hiren Shah
PDF
OSINT: Open Source Intelligence - Rohan Braganza
RED-TEAM_Conclave
Create a Custom Plugin in Burp Suite using the Extension
IOT SECURITY ASSESSMENT Pentester's Approach
Debugging Android Native Library
Burp Suite Extension Development
Log Analysis
Regular Expression Injection
HTML5 Messaging (Post Message)
Node.js Deserialization
RIA Cross Domain Policy
LDAP Injection
Python Deserialization Attacks
Sandboxing
NoSql Injection
Thick Client Testing Advanced
Thick Client Testing Basics
Markdown
Docker 101
Security Architecture Consulting - Hiren Shah
OSINT: Open Source Intelligence - Rohan Braganza

Recently uploaded (20)

PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Electronic commerce courselecture one. Pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Cloud computing and distributed systems.
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Approach and Philosophy of On baking technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Unlocking AI with Model Context Protocol (MCP)
Review of recent advances in non-invasive hemoglobin estimation
Electronic commerce courselecture one. Pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Advanced methodologies resolving dimensionality complications for autism neur...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Digital-Transformation-Roadmap-for-Companies.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Cloud computing and distributed systems.
“AI and Expert System Decision Support & Business Intelligence Systems”
Encapsulation_ Review paper, used for researhc scholars
Reach Out and Touch Someone: Haptics and Empathic Computing
Dropbox Q2 2025 Financial Results & Investor Presentation
Approach and Philosophy of On baking technology

Firmware Extraction & Fuzzing - Jatan Raval

  • 2. INTRODUCTION In this workshop you will learn the different ways of extracting the firmware and analysing the firmware. We will also cover the basic concepts of remote and guided fuzzing.
  • 3. My #firmware details ● Jatan K Raval ● Trainer ● M.Tech. in Cyber Security & Incident Response, GFSU. ● OSCP, OSCE ● Twitter: @jatankraval
  • 4. WHY DO WE NEED FIRMWARE? Firmware is a core part which provide integral functions for the hardware. It reveals the device architecture and the process to access the hardware
  • 5. WHY DO WE ANALYZE THE FIRMWARE? VULNERABILITIES SENSITIVE INFORMATION QEMU SHELL
  • 6. Firmware Extraction ● Serial Console ● Bin file dump ● SSH & Telnet
  • 7. SERIAL CONSOLE ● Identify the debug pins: Tx, Rx ● Usually the serial console pins are left for the debug purpose. ● It is used to catch the boot process and shell.
  • 9. BIN FILE DUMP ● Dump the bin file from EEPROM ● Tools: ○ HARDSPLOIT ○ RASPBERRY PI ○ Programmer
  • 10. BIN FILE DUMP ● Identify the EEPROM model. ● Connect the pins or desolder the EEPROM ● Put it in the programmer and read the chip content.
  • 13. BIN FILE DUMP: Raspberry Pi
  • 14. BIN FILE DUMP: Programmer ● Here we will extract the firmware of the IP Camera. ● Untie the screws and open the backpanel
  • 15. BIN FILE DUMP: Programmer ● Open the back panel and identify the UART pins. ● Identify the EEPROM details
  • 16. BIN FILE DUMP: Programmer ● Identify the EEPROM details and check the programer support.
  • 17. BIN FILE DUMP: Programmer ● Connect SOIC8 Clip to the EEPROM. ● Download the datasheet of the EEPROM.
  • 18. BIN FILE DUMP: Programmer ● Connect the pins to the programmer and select the EEPROM version family in prgrammer.
  • 19. BIN FILE DUMP: Programmer ● Dump the EEPROM content in a bin file.
  • 20. BIN FILE DUMP: Programmer ● Different programmers are also available which can read the EEPROM content.
  • 21. SSH & Telnet ● Enable the web console from the admin panel. ● Connect to the admin panel using the telnet. ● The SSH service is also enabled on some IoT devices.