You can refer to introductory article of our blog series for an idea as to what the naming conventions of these firmware files indicates. For instance, you can get 32-bit firmware for an ASA5505, 64-bit firmware for an ASA 5512-X or 64-bit firmware for ASA GNS3. Collecting firmwareĬisco allows you to download firmware files from their official website if you have bought a router with a specific license. If you want to have a summary of these tools, you can go to the end of this article. It also describes a small collection of Python and bash scripts we are releasing to help automate some of this process and ease the handling of a large corpus of firmware files. This post explains the general approach of manually extracting and repacking firmware files. Note that some similar automated target analysis and retrieval from lina was done by RiskSense in their work related to adding 9.x targets to the Equation Group EXTRABACON exploit. We did most of our analysis on a collection of approximately 170 Cisco firmware files ranging from 8.0.x to 9.7.x. Most importantly, we needed to mine exploit targets for both CVE-2016-1287 and CVE-2016-6366 and to apply patches or changes to specific versions prior to booting. If you haven’t already, we recommend that you read the introduction article prior to this one.ĭuring our research, we ended up wanting to analyse a large number of Cisco ASA firmware files. This article is part of a series of blog posts.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |