emba is being developed as a firmware scanner that analyses already-extracted Linux-based firmware images. It should help you to identify and focus on the interesting areas of a huge firmware image. Although emba is optimized for offline firmware images, it can test both, live systems and extracted images. Additionally, it can also analyze kernel configurations. emba is designed to assist a penetration tester. It is not designed as a standalone tool without human interaction. emba is designed to give as much information as possible about the firmware. The tester can decide on the areas to focus on and is always responsible for verifying and interpreting the results.
Before starting, check that all dependencies are met and use the installer.sh script:
./emba.sh -d
or ./emba.sh -d -F
Test firmware / live system
-a [MIPS] Architecture of the linux firmware [MIPS, ARM, x86, x64, PPC]
-A [MIPS] Force Architecture of the linux firmware [MIPS, ARM, x86, x64, PPC] (disable architecture check)
-l [./path] Log path
-f [./path] Firmware path
-e [./path] Exclude paths from testing (multiple usage possible)
-m [MODULE_NO.] Test only with set modules [e.g. -m 05 -m 10 ... ] (multiple usage possible)
-c Enable cwe-checker
Dependency check
-d Only check dependencies
-F Check dependencies but ignore errors
Test kernel config
-k [./config] Kernel config path
Modify output
-s Print only relative paths
-z Add ANSI color codes to log
Help
-h Print this help message
- Extract the firmware from an update file or from flash storage with binwalk or something else
- Execute emba with set parameters, e.g.
sudo ./emba.sh -l ./logs/arm_test -f ./firmware/arm_firmware/
- Path for logs and firmware path are necessary for testing successfully (WARNING: emba needs some free disk space for logging)
- Architecture will be detected automatically; you can overwrite it with
-a [ARCH]
- Use
-A [ARCH]
if you don't want to use auto detection for architecture - emba currently supports the following architectures: MIPS, ARM, PPC, x86 and x64
For testing live system with emba run it as if you were testing static firmware, but with /
as firmware path:
sudo ./emba.sh -l ./logs/local_test -f /
- Path for logs and firmware path are necessary for testing successfully
- Architecture will be detected automatically; you can overwrite it with
-a [ARCH]
- Use
-A [ARCH]
if you don't want to use auto detection for architecture - The paths
/proc
and/sys
will be automatically excluded - It improves output and performance, if you exclude docker
-e /var/lib/docker
Test only a kernel configuration with the kernel checker of checksec:
sudo ./emba.sh -l ./logs/kernel_conf -k ./kernel.config
- If you add
-f ./firmware/x86_firmware/
, it will ignore-k
and search for a kernel config inside the firmware
Good to know:
sudo
is necessary for some modules to run properly- Currently only tested on Kali Linux(2020.3)
- emba needs some free disk space for logging
- emba uses well known tools like objdump, LinEnum, checksec, linux-exploit-suggester.sh, cwe-checker
- emba includes multiple modules of the well known Linux analyser Lynis
emba uses multiple other tools and components.
For using emba with all features, you will need following tools on your Kali Linux:
readelf
find
grep
modinfo
realpath
sed
cut
sort
basename
strings
Option: tree
Option: shellcheck
Option: docker
Option: yara
To check these dependencies, only run sudo ./emba.sh -d
For installation of all needed dependencies, run sudo ./installer.sh
├── installer.sh
-> Tries to install all needed dependencies. Internet access for downloading is required.
- Afterwards no Internet access is needed
├── check_project.sh
-> Check full project with all subdirectories with shellchecker
- Install it on your system (Kali) with
apt-get install shellcheck
├── emba.sh
-> Main script of this project
├── config
-> Configuration files for different modules with file names, regular expressions or paths. These files are very handy, easy to use and they also keep the modules clean.
├── external
-> All tools and files which are from other projects and necessary for emba
├── helpers
-> Some scripts for stuff like pretty formatting on your terminal or path handling
└── modules
-> The stars of the project - every module is an own file and will be called by emba.
- ./yara
- yara rule files - add your own rules here
- ./checksec
- ./linux-exploit-suggester.sh
- ./objdump with all architectures enabled
- ./allitems.csv
- Use the CSV formated vulnerability list from Mitre: https://cve.mitre.org/data/downloads/
Look here - read this file, copy and modify it. Add your main function, where module_log_init
and module_title
are been called to the emba script. That's it. Or if you only want to run a single command:
Add your command to user_check and uncomment user_check
in the emba script.