Binwalk - a tool for searching in embedded files and executable code
Objectives
The goal in the context of the project is to gain knowledge and skills about Binwalk, an open-source tool for analyzing, reverse engineering and extracting firmware images.
The following tools can be used for reversing the firmware: Binwalk; Firmware Modification Kit(FMK). Firmwalk; FRAK (Firmware Reverse Analysis Konsole) Among the above tools, Binwalk and Firmware Modification Kit (FMK) are widely used. When to use which? If you just want to reverse a firmware, use Binwalk. If you want to reverse a firmware, modify a file and repack a firmware. Binwalk is a tool for searching in a given binary image for embedded files and executable code. Specifically, it is designed for identifying files and code embedded inside of firmware images. It uses the libmagic library, so it is compatible with magic signatures created for the Unix file utility.
Binwalk is an open-source tool for analyzing, reverse engineering and extracting firmware images. Binwalk is able to scan a firmware image and search for file signatures to identify and extract filesystem images, executable code, compressed archives, bootloader and kernel images, file formats like JPEGs and PDFs, and many more! Created in by ReFirm Lab’s own Principal Reverse Engineer Craig Heffner, Binwalk is widely recognized as the leading tool for reverse engineering firmware images.
Binwalk also includes a custom magic signature file, which contains improved signatures for files that are commonly found in firmware images such as compressed/archived files, firmware headers, Linux kernels, bootloaders, filesystems, etc.
For future reading:- http://domoticx.com/firmware-analyse-tool-binwalk-software/
- http://www.effecthacking.com/2017/06/binwalk-firmware-analysis-tool.html