fwhunt scan
1.0.0
用于分析UEFI固件和使用FWHUNT规则检查UEFI模块的工具。
Rizin(v0.6.2)
使用pip安装(在python3.6及以上测试):
$ python -m pip install fwhunt-scan
手动安装:
$ git clone https://github.com/binarly-io/fwhunt-scan.git && cd fwhunt-scan
$ python setup.py install
分析/扫描单独的模块:
$ python3 fwhunt_scan_analyzer.py analyze-module {image_path} -o out.json
$ python3 fwhunt_scan_analyzer.py scan-module --rule {rule_path} {image_path}
扫描整个固件图像:
$ python3 fwhunt_scan_analyzer.py scan-firmware -r rules/BRLY-2021-001.yml -r rules/BRLY-2021-004.yml -r rules/RsbStuffingCheck.yml test/fw.bin
为了避免安装依赖项,您可以使用Docker映像。
您可以在本地构建Docker映像,如下所示:
docker build -t fwhunt_scan .
或从GHCR中获取最新图像。
使用的示例:
docker run --rm -it -v {module_path}:/tmp/image:ro
fwhunt_scan analyze-module /tmp/image # to analyze EFI module
docker run --rm -it -v {module_path}:/tmp/image:ro -v {rule_path}:/tmp/rule.yml:ro
fwhunt_scan scan-module /tmp/image -r /tmp/rule.yml # to scan EFI module with specified FwHunt rule
docker run --rm -it -v {module_path}:/tmp/image:ro -v {rule_path}:/tmp/rule.yml:ro
fwhunt_scan scan-firmware /tmp/image -r /tmp/rule.yml # to scan firmware image with specified FwHunt rule
docker run --rm -it -v {module_path}:/tmp/image:ro -v {rules_directory}:/tmp/rules:ro
fwhunt_scan scan-firmware /tmp/image --rules_dir /tmp/rules # to scan firmware image with specified rules directory
所有这些步骤均在fwhunt_scan_docker.py脚本中自动化:
python3 fwhunt_scan_docker.py analyze-module {module_path} # to analyze EFI module
python3 fwhunt_scan_docker.py scan-module -r {rule_path} {module_path} # to scan EFI module with specified FwHunt rule
python3 fwhunt_scan_docker.py scan-firmware -r {rule_path} {firmware_path} # to scan firmware image with specified FwHunt rule
python3 fwhunt_scan_docker.py scan-firmware --rules_dir {rules_directory} {firmware_path} # to scan firmware image with specified rules directory
基本用法示例:
from fwhunt_scan import UefiAnalyzer
...
uefi_analyzer = UefiAnalyzer ( image_path = module_path )
print ( uefi_analyzer . get_summary ())
uefi_analyzer . close () from fwhunt_scan import UefiAnalyzer
...
with UefiAnalyzer ( image_path = module_path ) as uefi_analyzer :
print ( uefi_analyzer . get_summary ())在Linux平台上,您可以通过BLOB进行分析而不是文件:
from fwhunt_scan import UefiAnalyzer
...
with UefiAnalyzer ( blob = data ) as uefi_analyzer :
print ( uefi_analyzer . get_summary ()) from fwhunt_scan import UefiAnalyzer , UefiRule , UefiScanner
...
uefi_analyzer = UefiAnalyzer ( module_path )
# rule1 and rule2 - contents of the rules on YAML format
uefi_rules = [ UefiRule ( rule1 ), UefiRule ( rule2 )]
scanner = UefiScanner ( uefi_analyzer , uefi_rules )
result = scanner . result