EMBEDDED DEVICE FIRMWARE VULNERABILITY HUNTING USING FRAK

Black Hat USA 2012

Presented by: Ang Cui
Date: Thursday July 26, 2012
Time: 14:35 - 14:55
Location: Palace III
Track: Over the Air and In The Device

We present FRAK**, the firmware reverse analysis konsole. FRAK is a framework for unpacking, analyzing, modifying and repacking the firmware images of proprietary embedded devices. The FRAK framework provides a programmatic environment for the analysis of arbitrary embedded device firmware as well as an interactive environment for the disassembly, manipulation and re-assembly of such binary images. We demonstrate the automated analysis of Cisco IOS, Cisco IP phone and HP LaserJet printer firmware images. We show how FRAK can integrate with existing vulnerability analysis tools to automate bug hunting for embedded devices. We also demonstrate how FRAK can be used to inject experimental host-based defenses into proprietary devices like Cisco routers and HP printers.

Ang Cui

Ang Cui is currently a PhD student at Columbia University in the Intrusion Detection Systems Laboratory. His research focuses on the exploitation and defense of embedded devices. Before starting his PhD, Ang worked as a security specialist within various financial institutions.


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats