• Watch
  • Listen
  • Live Stream
Security Weekly
Security Market Validation
  • Listeners
    • Subscribe
    • Insider List
    • Suggest a Guest
  • Shows
    • Paul’s Security Weekly
    • Enterprise Security Weekly
    • Business Security Weekly
    • Application Security Weekly
    • Security & Compliance Weekly
    • Security Weekly News
    • Tradecraft Security Weekly
    • Secure Digital Life
  • Webcasts/Trainings
    • Registration
    • On-demand
  • Articles
  • Surveys
  • Partners
    • Request a Briefing
    • Become a Partner
    • Landing Pages
    • Bookings
      • Approved Interview Form
      • Approved Interview Form – Returning Guest
      • Book a Conference Interview
      • Conference Collection Form
  • Hosts
  • Company
    • About
    • Contact
    • Careers

Articles

Creating Malicious Firmware with Firmware-Mod-Kit

Paul Asadoorian June 18, 2013

Firmware-Mod-Kit to make Malicious Firmware

The intent of this tech segment is really to show how insecure devices are, and how we need to be cautious when rooting, modifying or updating firmware. Where it first starts is a tool create by Craig Heffner and Jeremy Collake ( download here ). It allows you to take firmware and strip it down to its root file system, Craig uses that and binwalk a lot in his blog for embedded device hacking devttys0 . The use of the collection of scripts is completely easy, however, it saves you tons and tons of time, doing any of it manually would take hours if not days. Lets dive right into it.
First, we need to extract the firmware we have. I am using a router that is running dd-wrt, so I figure that would be a good firmware to get and rip apart. First, we run the command ./extract-firmware.sh filename. This will decompress the firmware and put it nicely into a “fmk/” directory.

 
Next we extract the dd-wrt gui (web sites) by typing ./ddwrt-gui-extract.sh:



We then find our target page Info.htm, open it and add in our XSS beef hook:


We package it all up and with ./ddwrt-gui-rebuild & ./build-firmware. When its done, we flash our router with the new firmware. When we come back to the page… our browser is now hooked and expoited.

 

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Facebook (Opens in new window)

Related Posts

abstract-technology-science-concept-brain-digital-link-binary-hi-tech-blue-background_36402-92

Articles /

Selecting the Right Brain for Your Sensors

AdobeStock_145255314-1013x440

Articles /

Security Awareness Training – Time for a Change in Philosophy?

CT_web_featured_3_20_20

Articles /

How Can We Vaccinate Our Networks?

‹ SSH over Stunnel for IDS evasion › The Three Most Common Tools Used to Breach Systems

About Security Weekly

Security Weekly is the security podcast network for the security community, distributing free podcasts and media since 2005. We connect the security industry and the security community through our security market validation programs.

More Than Just A Sponsor

We view our relationships with the security industry as partnerships, not sponsorships. Security Weekly works closely with each partner to help you achieve your marketing goals and gain traction in the security market. Interested in becoming a partner? Please visit our partnerships page.

Back to Top

Subscribe To The Blog:

RSS Feed RSS - Posts

Search

Follow Us On Twitter

→ Follow Us
© Security Weekly 2021
Powered by WordPress • Themify WordPress Themes