diff --git a/docs/firmware/firmware-dumping.md b/docs/firmware/firmware-dumping.md index 4a055d6..2b3be2e 100644 --- a/docs/firmware/firmware-dumping.md +++ b/docs/firmware/firmware-dumping.md @@ -148,7 +148,7 @@ Emulate : `qemu-system-avr -S -s -nographic -serial tcp::5678,server=on,wait=off ## Explore firmware -* strings +* [unix/strings](#) ```ps1 $ strings file.bin @@ -159,14 +159,14 @@ Emulate : `qemu-system-avr -S -s -nographic -serial tcp::5678,server=on,wait=off The -t flag will return the offset of the string within the file. -tx will return it in hex format, T-to in octal and -td in decimal. ``` -* dd +* [unix/dd](#) ```ps1 $ dd if=firmware.bin of=firmware.chunk bs=1 skip=$((0x200)) count=$((0x400-0x200)) If we wanted to run it a little faster, we could increase the block size: $ dd if=firmware.bin of=firmware.chunk bs=$((0x100)) skip=$((0x200/0x100)) count=$(((0x400-0x200)/0x100)) ``` -* binwalk +* [ReFirmLabs/binwalk](https://github.com/ReFirmLabs/binwalk) ```powershell $ binwalk -Me file.bin $ binwalk -Y dump.elf @@ -175,11 +175,17 @@ Emulate : `qemu-system-avr -S -s -nographic -serial tcp::5678,server=on,wait=off 3708 0xE7C ARM executable code, 16-bit (Thumb), little endian, at least 522 valid instructions ``` -* Unsquashfs +* [squashfs-tools/unsquashfs](#) ```powershell sudo unsquashfs -f -d /media/seagate /tmp/file.squashfs ``` +* [onekey-sec/unblob](https://github.com/onekey-sec/unblob) + ```ps1 + docker run --rm --pull always -v /path/to/extract-dir/on/host:/data/output -v /path/to/files/on/host:/data/input ghcr.io/onekey-sec/unblob:latest /data/input/path/to/file + docker run --rm --pull always ghcr.io/onekey-sec/unblob:latest --help + ``` + * [onekey-sec/jefferson](https://github.com/onekey-sec/jefferson/) - JFFS2 filesystem extraction tool ```ps1 pip install jefferson diff --git a/docs/gadgets/esp32.md b/docs/gadgets/esp32.md index 4ee49b8..d3da9a3 100644 --- a/docs/gadgets/esp32.md +++ b/docs/gadgets/esp32.md @@ -9,6 +9,7 @@ * [jmswrnr/esp32knife](https://github.com/jmswrnr/esp32knife) - Tools for ESP32 firmware dissection * [scientifichackers/ampy](https://github.com/scientifichackers/ampy) - Utility to interact with a MicroPython board over a serial connection * [ESPWebTool](https://esp.huhn.me/) - Flash your ESP32 or ESP8266 through your browser. +* [tenable/esp32_image_parser](https://github.com/tenable/esp32_image_parser) - A toolkit for helping you reverse engineer ESP32 firmware. ## Firmwares