Closed m-1-k-3 closed 2 years ago
Thank you. You pass the capsule file to the input of the analyzer. Not surprisingly, it falls with an exception. The scanner can be used in two ways:
As far as I understand, you are trying to scan this file:
This is a capsule in AMIPFAT
format, which we need to unpack first. AMI_PFAT_Extract should work just fine.
After using AMI_PFAT_Extract you will find this file bc0064.cap_extracted/bc0064.cap -- 1_00 -- AMI_PFAT_1_DATA_ALL.bin
.
This is the unpacked firmware file, which will be perfectly parsed by UEFITool or uefi_firmware (used by fwhunt_scan).
To scan this file with fwhunt_scan
, you can use the command: python3 fwhunt_scan_analyzer.py scan-firmware ~/Downloads/bc0064.cap_extracted/bc0064.cap\ --\ 1_00\ --\ AMI_PFAT_1_DATA_ALL.bin --rules_dir ~/github/FwHunt/rules/Vulnerabilities/AMI
@m-1-k-3 I've add check for bytes_le
argument before converting it to uuid
. Let me know if you have any other problems using fwhunt_scan
.
@yeggor now I got the same results. Thank you for your support.
Currently testing fwhunt-scan on Kali Linux:
Was running into the following exception:
Quick and dirty fix: