Trommel - Sift Through Embedded Device Files To Order Potential Vulnerable Indicators
Friday, September 20, 2019
Edit
Trommel - Sift Through Embedded Device Files To Order Potential Vulnerable Indicators - Hi friends mederc, In the article that you read this time with the title Trommel - Sift Through Embedded Device Files To Order Potential Vulnerable Indicators, We have prepared this article well for you to read and retrieve information from it. hopefully fill the posts
Article Linux,
Article Mac,
Article Static Analysis,
Article TROMMEL,
Article vulnerabilities,
Article Vulnerability,
Article Vulnerability Analysis,
Article Windows, we write this you can understand. Alright, happy reading.
Title : Trommel - Sift Through Embedded Device Files To Order Potential Vulnerable Indicators
link : Trommel - Sift Through Embedded Device Files To Order Potential Vulnerable Indicators
TROMMEL sifts through embedded device files to position potential vulnerable indicators.
TROMMEL identifies the next indicators related to:
Dependencies
Usage
Notes
References
Author
You are now reading the article Trommel - Sift Through Embedded Device Files To Order Potential Vulnerable Indicators with the link address https://mederc.blogspot.com/2019/09/trommel-sift-through-embedded-device.html
Title : Trommel - Sift Through Embedded Device Files To Order Potential Vulnerable Indicators
link : Trommel - Sift Through Embedded Device Files To Order Potential Vulnerable Indicators
Trommel - Sift Through Embedded Device Files To Order Potential Vulnerable Indicators
TROMMEL sifts through embedded device files to position potential vulnerable indicators.
TROMMEL identifies the next indicators related to:
- Secure Shell (SSH) cardinal files
- Secure Socket Layer (SSL) cardinal files
- Internet Protocol (IP) addresses
- Uniform Resource Locator (URL)
- email addresses
- shell scripts
- web server binaries
- configuration files
- database files
- specific binaries files (i.e. Dropbear, BusyBox, etc.)
- shared object library files
- web application scripting variables, and
- Android application packet (APK) file permissions.
Dependencies
- Python-Magic - See documentation for instructions for Python3-magic installation
- vFeed Database - For non-commercial use, register as well as download the Community Edition database
Usage
$ trommel.py --help
Output TROMMEL results to a file based on a given directory. By default, alone searches manifestly text files.$ trommel.py -p /directory -o output_file
Output TROMMEL results to a file based on a given directory. Search both binary as well as manifestly text files.$ trommel.py -p /directory -o output_file -b
Notes
- The intended role of TROMMEL is to assistance researchers during firmware analysis.
- TROMMEL has been tested using Python3 on Kali Linux x86_64.
- TROMMEL was written amongst the intent to aid amongst identifying indicators that may comprise vulnerabilities constitute inwards firmware of embedded devices.
References
- vFeed
- Firmwalker
- Lua Code: Security Overview as well as Practical Approaches to Static Analysis yesteryear Andrei Costin
Author
- Kyle O'Meara - komeara AT cert DOT org
Thus the article Trommel - Sift Through Embedded Device Files To Order Potential Vulnerable Indicators
That's all the article Trommel - Sift Through Embedded Device Files To Order Potential Vulnerable Indicators this time, hopefully can benefit you all. okay, see you in another article posting.
You are now reading the article Trommel - Sift Through Embedded Device Files To Order Potential Vulnerable Indicators with the link address https://mederc.blogspot.com/2019/09/trommel-sift-through-embedded-device.html