attify / firmware-analysis-toolkit

Toolkit to emulate firmware and analyse it for security vulnerabilities
MIT License
1.35k stars 256 forks source link

can't run fat to ananlysis firmware #34

Open owenbill opened 5 years ago

owenbill commented 5 years ago

Hi All, when i running sudo ./fat.sh then i got following error [+] Architecture : line 7: ./firmadyne.config: Permission denied Traceback (most recent call last): File "./fat.py", line 122, in main() File "./fat.py", line 114, in main arch = identify_arch(image_id)
File "./fat.py", line 62, in identifyarch child.expect("Password for user firmadyne: ")
File "/usr/local/lib/python2.7/dist-packages/pexpect/spawnbase.py", line 341, in expect timeout, searchwindowsize, async
) File "/usr/local/lib/python2.7/dist-packages/pexpect/spawnbase.py", line 369, in expect_list return exp.expect_loop(timeout) File "/usr/local/lib/python2.7/dist-packages/pexpect/expect.py", line 117, in expect_loop return self.eof(e) File "/usr/local/lib/python2.7/dist-packages/pexpect/expect.py", line 63, in eof raise EOF(msg) pexpect.exceptions.EOF: End Of File (EOF). Exception style platform. <pexpect.pty_spawn.spawn object at 0x7f4a16241610> command: /home/bill/firmware-analysis-toolkit/firmadyne/scripts/getArch.sh args: ['/home/bill/firmware-analysis-toolkit/firmadyne/scripts/getArch.sh', './images/1.tar.gz'] buffer (last 100 chars): ''

after: <class 'pexpect.exceptions.EOF'> and i use user permission to install so how to check the issue? Thanks

kismp123 commented 4 years ago

I think you should run extrator.py. as you wrote, I also met this problem. I don't remember how I solve. anyway you should run extractor.py and see logs.