Blog | G5 Cyber Security

Binwalk IMOU Firmware Analysis

TL;DR

This guide shows you how to use Binwalk to analyse an IMOU firmware dump and extract potentially interesting filesystems. We’ll cover initial scan, filesystem identification, extraction, and a basic look at the extracted contents.

Step 1: Install Binwalk

If you don’t have it already, install Binwalk. The installation method depends on your operating system:

Step 2: Initial Firmware Scan

Run a basic scan on your IMOU firmware file (replace firmware.bin with the actual filename). This will identify potential signatures and compression types.

binwalk firmware.bin

Review the output carefully. Look for filesystem signatures like SquashFS, UBIFS, JFFS2, or others. Pay attention to any compressed data sections too (e.g., LZMA, gzip).

Step 3: Extract Filesystems

Use Binwalk to automatically extract the identified filesystems. The -M option tells Binwalk to attempt extraction even if signatures are overlapping.

binwalk -M firmware.bin

This will create a directory for each extracted filesystem (e.g., `firmware_squashfs`, `firmware_ubifs`). The output will tell you which filesystems were found and where they are extracted.

Step 4: Examine Extracted Filesystems

Navigate into the directories created in Step 3. Each filesystem has a different structure, so how you explore it depends on the type:

Step 5: Look for Interesting Files

Once you’ve mounted or extracted the filesystem, start looking for potentially interesting files:

Step 6: Further Analysis

After extracting the filesystem, you can perform more in-depth analysis:

Exit mobile version