[Day 20] Firmware
December 20, 2022
Last updated
December 20, 2022
Last updated
For today's challenge, I was to find hidden paraphrases, and public/private keys, then reverse engineer a firmware for a flag. THM explained some differences between static and dynamic analysis which are two methods for reversing software but also a method for testing applications in debugging. In this challenge, I find a previous firmware that is unencrypted to gather paraphrases so it could be used to (hopefully) unencrypt to new, targeted firmware. Upon my success, I use the paraphrase to unencrypt the firmware and retrieve the firmware build number and flag.
Using Grep to find public and private keys and paraphrases.
Using paraphrase on older firmware and getting secret key by entering in unencrypted paraphrase.
Listing Secret keys
Using paraphrase on newer firmware.
Flag retrieval and firmware information.
THM{WE_GOT_THE_FIRMWARE_CODE}
Santa@2022
grep -ir build
2.6.31