https://github.com/junxian428/firmware_analysis_and_emulation_learning
Firmware analysis and emulation (Firmware Dlink devices) Reference From https://youtu.be/dkGHoGlgodA
https://github.com/junxian428/firmware_analysis_and_emulation_learning
firmware-analysis reverse-engineering
Last synced: 3 months ago
JSON representation
Firmware analysis and emulation (Firmware Dlink devices) Reference From https://youtu.be/dkGHoGlgodA
- Host: GitHub
- URL: https://github.com/junxian428/firmware_analysis_and_emulation_learning
- Owner: junxian428
- Created: 2022-09-22T06:00:58.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2022-09-22T06:29:16.000Z (over 3 years ago)
- Last Synced: 2025-01-21T15:50:29.791Z (about 1 year ago)
- Topics: firmware-analysis, reverse-engineering
- Homepage:
- Size: 0 Bytes
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Firmware_Analysis_and_Emulation_Learning
Download Firmware
binwalk XXX.bin
dd if=XXX skip=XXX bs=1 of=dlink.sqsh
______________________________________________________________________________________________
# Download Emulator
sudo apt -y install qemu-user-static
_________________________________________________________________________________________________
sudo unsquashfs dlink.sqsh
_________________________________________________________________________________________________________
cd squash-root
ls
file bin/busybox
—————————————————————————————————————————————————————————————————————————————————————————————————————————
qemu-mips-static bin/busybox
____________________________________________________________________________________________________________
sudo mount --bind /sys /home/kali/Downloads/squashfs-root/sys
sudo mount --bind /dev /home/kali/Downloads/squashfs-root/dev
sudo mount --bind /proc /home/kali/Downloads/squashfs-root/proc
sudo chroot . /bin/sh
_______________________________________________________________________________________________________________
netstat -tln
Now go to port:XX should can see the IPCamera for our case.