kanghtta 发表于 2011-12-23 03:37

fireware 逆向学习总结

<div>牛逼的人:<a href="http://www.devttys0.com/" target="_blank">http://www.devttys0.com</a></div><div>fireware crack 学习:</div><div>&nbsp;&nbsp; &nbsp;对fireware逆向的主要过程:</div><div>&nbsp;&nbsp; &nbsp; &nbsp; &nbsp;1.确定并抽取来自于fireware的实际的执行代码.</div><div>&nbsp;&nbsp; &nbsp; &nbsp; &nbsp;2.从可执行代码中确定装载地址</div><div>&nbsp;&nbsp; &nbsp; &nbsp; &nbsp;3.使用装载地址将可执行代码载入IDA</div><div>&nbsp;&nbsp; &nbsp; &nbsp; &nbsp;4.使用自动化或脚本加强IDA 自动分析.</div><div>&nbsp;&nbsp; &nbsp; &nbsp; &nbsp;</div><div>&nbsp;&nbsp; &nbsp;使用JTAG调试或从串口获取调试信息对#1和#2 过程进行观察.</div><div>&nbsp;&nbsp; &nbsp;但是,如果没有相关设备,这将是基于纯firmware的分析.</div><div>&nbsp;&nbsp; &nbsp;</div><div>&nbsp;&nbsp; &nbsp;首先,在fireware中定位任何可辨认的数据块.</div><div>&nbsp;&nbsp; &nbsp; &nbsp; &nbsp;1.使用binwalk查看</div><div>&nbsp;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;a:) 是否被压缩,有无压缩签名</div><div>&nbsp;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;b:) 包含什么文件,使用什么文件系统.</div><div>&nbsp;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;c:) 有无可执行文件头</div><div>&nbsp;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;d:) 观察bin中字符串,找相应信息.strings&nbsp;</div><div>&nbsp;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;e:) 抽取,dd.</div><div>&nbsp;</div><div>&nbsp;&nbsp; &nbsp; &nbsp; &nbsp;2.二进制工具观察,hexdump,UE</div><div>&nbsp;&nbsp; &nbsp; &nbsp; &nbsp;3.分析硬件体系结构,找到装载地址,使用IDA 载入.elf/etc..</div><div>&nbsp;&nbsp; &nbsp; &nbsp; &nbsp;4.确定载入地址是否正确.</div><div>&nbsp;&nbsp; &nbsp; &nbsp; &nbsp;5.编写自动化脚本分析.</div><div><br></div><div>&nbsp;&nbsp; &nbsp; &nbsp; &nbsp;</div><div>神秘的文件系统:</div><div>&nbsp;&nbsp; &nbsp;</div><div>&nbsp;&nbsp; &nbsp;</div><div><br></div><div>&nbsp;&nbsp; &nbsp;</div><div>加强学习:</div><div>&nbsp;&nbsp; &nbsp;mips 汇编</div><div>&nbsp;&nbsp; &nbsp;sql 注入攻击,原理</div><div>&nbsp;&nbsp; &nbsp;IDA</div><div>&nbsp;&nbsp; &nbsp;体系结构</div><div>&nbsp;&nbsp; &nbsp;Qemu 使用,支持多种不同的体系结构.</div>

我愿为你匍匐一生 发表于 2024-02-11 08:35

页: [1]
查看完整版本: fireware 逆向学习总结