Vulnerability mining method and device based on Internet of Things firmware, equipment and storage medium
A technology of vulnerability mining and networking equipment, which is applied in the computer field and can solve problems such as security hazards
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0061] see figure 1 , figure 1 It is a schematic flowchart of a method for mining vulnerabilities based on the firmware of the Internet of Things disclosed in the embodiment of the present application. Such as figure 1 As shown, the method of the embodiment of the present application includes the following steps:
[0062] 101. Obtain the binary file of the target IoT device;
[0063] 102. Extracting the firmware of the target IoT device according to the binary file of the target IoT device;
[0064] 103. Analyze the firmware of the target Internet of Things and obtain the symbol information of the firmware;
[0065] 104. Search system functions based on vulnerability search scripts and symbol information and determine the function address of the system function;
[0066] 105. Search for the reference function of the system function based on the vulnerability search script and the function address of the system function, and obtain the function address of the reference fun...
specific Embodiment approach
[0073] In the embodiment of the present application, as an optional implementation manner, regarding step 102, a specific implementation manner of extracting the firmware of the target IoT device according to the binary file of the target IoT device is as follows:
[0074] Use the binwalk tool to extract the firmware of the target IoT device from the binary file of the target IoT device. Among them, the Binwalk tool is a tool for searching a given binary image file to obtain embedded files and codes. Specifically, it is designed to identify the files and codes embedded in the firmware image. Therefore, in this embodiment, the binwalk tool can be used to identify the codes and files of the firmware part in the binary files of the target IoT device, so that based on the recognition results , which extracts the firmware of the target IoT device.
[0075] In the embodiment of the present application, as an optional implementation manner, regarding step 103, a specific implementat...
Embodiment 2
[0113] see Figure 4 , Figure 4 It is a schematic structural diagram of a vulnerability mining device based on the firmware of the Internet of Things disclosed in the embodiment of the present application. Such as Figure 4 As shown, the device of the embodiment of the present application includes the following functional modules:
[0114] Obtaining module 201, configured to obtain the binary file of the target IoT device;
[0115] An extraction module 202, configured to extract the firmware of the target Internet of Things according to the binary file of the target Internet of Things device;
[0116] The analysis module 203 is used to analyze the firmware of the target Internet of Things and obtain the symbolic information of the firmware;
[0117] The first search module 204 is configured to search system functions based on vulnerability search scripts and symbol information and determine function addresses of system functions;
[0118] The second search module 205 is us...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


