All Projects → grant-h → ShannonBaseband

grant-h / ShannonBaseband

Licence: other
Scripts, plugins, and information for working with Samsung's Shannon baseband.

Programming Languages

c
50402 projects - #5 most used programming language
java
68154 projects - #9 most used programming language
python
139335 projects - #7 most used programming language
shell
77523 projects

Projects that are alternatives of or similar to ShannonBaseband

Samsung Trustzone Research
Reverse-engineering tools and exploits for Samsung's implementation of TrustZone
Stars: ✭ 85 (+23.19%)
Mutual labels:  samsung, exploitation
browserrecon-php
Advanced Web Browser Fingerprinting
Stars: ✭ 29 (-57.97%)
Mutual labels:  exploitation
linksys-wrt54g
Exploiting Linksys WRT54G using a vulnerability I found.
Stars: ✭ 31 (-55.07%)
Mutual labels:  exploitation
adb-cheatsheet
Your journey to master Android™ Shell begins here
Stars: ✭ 44 (-36.23%)
Mutual labels:  samsung
DrGadget
dr.rer.oec.gadget IDAPython plugin for the Interactive Disassembler <ABANDONED PROJECT>
Stars: ✭ 61 (-11.59%)
Mutual labels:  exploitation
Bash
Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.
Stars: ✭ 19 (-72.46%)
Mutual labels:  exploitation
exploiting
Exploiting challenges in Linux and Windows
Stars: ✭ 122 (+76.81%)
Mutual labels:  exploitation
ROP-Emporium
Solutions for ROP Emporium challenges (https://ropemporium.com/) in python.
Stars: ✭ 38 (-44.93%)
Mutual labels:  exploitation
CVE-2016-7255
An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit
Stars: ✭ 85 (+23.19%)
Mutual labels:  exploitation
Pentest-Bookmarkz
A collection of useful links for Pentesters
Stars: ✭ 118 (+71.01%)
Mutual labels:  exploitation
qemu-exynos-bootrom
Emulating Exynos 4210 BootROM in QEMU
Stars: ✭ 49 (-28.99%)
Mutual labels:  samsung
volana
🌒 Shell command obfuscation to avoid detection systems
Stars: ✭ 38 (-44.93%)
Mutual labels:  exploitation
SQL-Injection-cheat-sheet
Cheatsheet to exploit and learn SQL Injection.
Stars: ✭ 69 (+0%)
Mutual labels:  exploitation
sedoppkit
A knockoff social-engineer toolkit
Stars: ✭ 46 (-33.33%)
Mutual labels:  exploitation
ropr
A blazing fast™ multithreaded ROP Gadget finder. ropper / ropgadget alternative
Stars: ✭ 200 (+189.86%)
Mutual labels:  exploitation
Python
Python Powered Repository
Stars: ✭ 17 (-75.36%)
Mutual labels:  exploitation
phuzz
Find exploitable PHP files by parameter fuzzing and function call tracing
Stars: ✭ 53 (-23.19%)
Mutual labels:  exploitation
Reconky-Automated Bash Script
Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Stars: ✭ 167 (+142.03%)
Mutual labels:  exploitation
nocom-explanation
block game military grade radar
Stars: ✭ 544 (+688.41%)
Mutual labels:  exploitation
com.samsung.smart
Samsung Smart TV app for Athom Homey
Stars: ✭ 17 (-75.36%)
Mutual labels:  samsung

Samsung's Shannon Baseband Tool Repository Build and test ShannonLoader

Scripts, tools, and information to help reverse engineer Samsung's EXYNOS cellular baseband platform, codenamed Shannon. These tools were released for the talk "Emulating Samsung's Shannon Baseband for Security Testing" at Black Hat USA'2020, August 5th.

Index

ShannonLoader: reversing/ghidra/ShannonLoader

A Ghidra extension for loading modem.bin binaries from nearly all known modems to date. All firmware images from https://github.com/grant-h/ShannonFirmware are loaded during CI tests for the loader to ensure its compatibility.

Ghidra Scripts: reversing/ghidra/scripts

Ghidra post-loading Python scripts that help annotate Shannon modem images. This includes recovering debug strings and auto-naming functions. Use after loading with ShannonLoader.

Modem Binary Scripts: reversing/modem

Raw modem.bin extraction script into sub parts and others as they are developed.

Modem Log File Processing: reversing/btl

Scripts and info to parse Back Trace Log (BTL) files. These are included during modem crashes / dumps or via the "CP RAM Logging" functionality. These are compressed log files from the actual running modem.

Extracted Firmware Structures: firmware/

Information on firmware acquistion and some extracted data dumps.

Getting started with Shannon Firmware

Here's a quick tutorial to start reversing this firmware with GHIDRA.

  1. Download the firmware binary of choice. Make sure you have extracted the CP partition from official Samsung firmware and have further extracted the modem.bin file. Make sure to unlz4 the binary if it is compressed.
  2. Install the ShannonLoader at the splash screen using File » Install Extensions.... Target the ShannonLoader.zip release that is in the latest release tag
  3. Now start a new GHIDRA project and add a new file. Select the modem.bin file. You should see that this file's loader is automatically selected as "Samsung Shannon Modem Binary". If you do not see this, make sure that you have loaded the right file and installed the extension properly. Open GHIDRA debug console (bottom right on splash screen) to double check if there are any errors.
  4. Import the file, let the loader finish and once again make sure there were no errors during loading.
  5. Double click on the imported file to open CodeBrowser and hit no to auto-analysis for now.
  6. Now run the ShannonTraceEntry.py python script from Script Manager under the "Shannon" category. Make sure to either place scripts into your user home directory at ~/ghidra_scripts (Linux) or add the path to them in the manager. This script will identify all trace debugging information before analysis and avoid diassembling data.
  7. Go to Analysis » Auto analyze..., and uncheck the "Non-returning Functions - Discovered" analyzer as this causes broken recovery of the log_printf function, leading to broken disassembly throughout the binary. If you do not uncheck this, you will need to restart your import from scratch.
  8. Hit analyze and let GHIDRA churn away until it settles.
  9. Next optionally run the auto-renamer script, ShannonRename.py. This will help you navigate the binary, but remember that the names are heuristically determined, so quality may vary. Functions with the same guessed name will have a numeric prefix appended.
  10. Start reversing!

If you want a quick look around, we exported a GHIDRA project for a 2017 modem image.

Related Resources

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].