Additional notes
This wiki contains notes from various contributors to get FAT running and some additional firmware specific tweaks etc. Everything will be put in this page as of now and will be categorized later on.
This file will be updated with the additional notes regarding Firmware Analysis, and getting things working. Every month things from the wiki will be merged to the main README if needed.
Submitted by Paul
When installing binwalk, at ./deps.sh
stage, some packages aren't found so use this link
Install openjdk-8-jdk
and remove openjdk-7-jdk
from the script and install a few extra dependancies:
sudo apt-get install qemu qemu-user-static
Move files from firmware-analysis-toolkit into firmadyne dir.
Install postgres, setup db;
sudo -u postgres createuser firmadyne
root@kali:~/tools/firmadyne# sudo -u postgres psql
postgres=# \password firmadyne
Enter new password:
Enter it again:
Passwords didn't match.
postgres=# \password firmadyne
Enter new password:
Enter it again:
postgres-# \q
root@kali:~/tools/firmadyne# ./reset.sh
[+] Deleting existing database with the name firmware
Password for user firmadyne:
[+] Creating new database with firmware with the user firmadyne
[+] Making necessary changes to the db
CREATE TABLE
...
[+] Cleaning previous images and created files by firmadyne
[+] All done. Go ahead and run fat.py to continue firmware analysis
FAT : Firmware Analysis Tookit is an open source project to help individuals and security researchers look into firmware security issues and develop new techniques of security assessment.
This tool was developed as a part of Offensive IoT Exploitation training conducted by Attify