by Saumil Shah @therealsaumil
March 2020
The ARM-X Firmware Emulation Framework is a collection of scripts, kernels and filesystems to be used with QEMU to emulate ARM/Linux IoT devices. ARM-X is aimed to facilitate IoT research by virtualising as much of the physical device as possible. It is the closest we can get to an actual IoT VM.
Devices successfully emulated with ARM-X so far:
- D-Link DIR-880L Wi-Fi Router
- Netgear Nighthawk R6250 Wi-Fi Router
- Netgear Nighthawk R6400 Wi-Fi Router
- Trivision NC227WF Wireless IP Camera
- Cisco RV130 Wi-Fi Router
Precursors of ARM-X have been used in Saumil Shah's popular ARM IoT Exploit Laboratory training classes where students have found four 0-day vulnerabilities in various ARM/Linux IoT devices.
ARM-X is a collection of scripts, kernels and filesystems residing in the /armx
directory. It uses qemu-system-arm
to boot up a virtual ARM/Linux environment. The /armx
directory is exported over NFS to also make the contents available within the QEMU guest.
The host system running qemu-system-arm
is assigned the IP address 192.168.100.1
and the QEMU guest is assigned 192.168.100.2
via tap0
interface.
The /armx
directory is organised as follows:
devices
: This file contains device definitions, one per line.qemuopts
: Abstracted QEMU options definitions for various types of QEMU Machines.run/
: This folder contains scripts necessary to parse the device configuration, preload nvram contents and eventually invoke the userland processes of the device being emulated.run/launcher
: The main script.launcher
parses thedevices
file and displays a menu of registered devices. Selecting one of the devices will in turn invokeqemu-system-arm
with the pre-defined QEMU options, corresponding Linux kernel and extracted root file system registered with the device.template/
: Sample configuration and layout for a new device. Make a copy of the template when beginning to emulate a new IoT device.
Each emulated device contains the following files/directories:
config
: Contains the device's name and description, ASLR settings, location of its root file system and commands to issue after the kernel has booted up and transferred control to the userland.nvram.ini
: Contents of the device's non volatile memory, used for storing configuration settings. Contents ofnvram.ini
are preloaded into the emulated nvram before invoking the userland init scripts.kernel/
: Contains a Linux kernel compiled (mostly via Buildroot) to closely match the properties of the emulated device such as kernel version, CPU support, VM_SPLIT, supported peripherals, etc.rootfs/
: Populated with the uncompressed file system extracted from the device's firmware.run-init
: Script invoked by the launcher.
The diagram below describes each stage of ARM-X:
- Invoke
/armx/run/launcher
. This will display a menu as shown below. In this example, we select the Trivision TRI227WF Wireless IP Camera.
- Selecting one of the devices will launch it under QEMU. The kernel which is included in the
kernel/
directory of the Trivision IP Camera's device configuration, is booted inqemu-system-arm
and uses a pre-built Buildroot filesystem, which is referred to ashostfs.ext2
. Host and guest IP addresses are assigned to192.168.100.1
and192.168.100.2
respectively.
-
hostfs.ext2
contains several scripts and tools useful for running and dynamic analysis of the emulated device. The init scripts inhostfs.ext2
mount the/armx
directory over NFS. Thus, the contents of/armx
are shared by both the host and the QEMU guest. -
To kick off the rest of the device startup, connect to the QEMU guest using SSH
ssh [email protected]
. This brings up a menu as shown below:
- Selecting the option to launch the userland init scripts of the device results in
run-init
being invoked from the corresponding device configuration directory within/armx
. First, the contents ofnvram.ini
are loaded into the kernel's emulated nvram driver. Next, achroot
jail is created using therootfs
of the device. Lastly, the registered initialisation commands are invoked in the newlychroot
edrootfs
, bringing up the device's services and init scripts.
- Once the device has fully "booted up" in ARM-X, it is available for testing and analysis. The image below shows the administration interface of the IP Camera loaded in a browser:
Before you begin to emulate an IoT device, you will need the following:
- Detailed analysis of the IoT device
- CPU (ARMv5/ARMv6/ARMv7)
- Linux Kernel version
- Extracted mtdblocks (rootfs)
- Contents of nvram
- Generate a compatible kernel using Buildroot or Linux Kernel sources
- A week for troubleshooting!
The following diagram outlines the overall process of IoT device emulation.
Steps involved:
- Copy the
template
directory to make a new device configuration. - Compile a matching kernel from source, and place it in the
kernel/
directory. - Copy the extracted
rootfs
from the device's firmware into therootfs/
directory. Typically these would be SquashFS or CramFS filesystems, uncompressed usingbinwalk
orunsquashfs
orcramfsck
. - Place the contents of extracted nvram in
nvram.ini
- Edit the
config
file with the newly populated device firmware contents. - Create a new device record in the
devices
file. Pay close attention to QEMU command line options.
The following sample kernels are provided with the template.
zImage-2.6.39.4-vexpress
ARMv7 CPU on avexpress-a9
board.zImage-2.6.31.14-realview-rv130-nothumb
ARMv6 CPU on arealview-eb
board.zImage-2.6.31-versatile-nothumb
ARMv5 CPU on aversatilepb
board.
However, it is encouraged to build a compatible kernel from source.
Presentation at Countermeasure 2019 on 7 November 2019.
<iframe src="//www.slideshare.net/slideshow/embed_code/key/6P5quK19YMwYQ5" width="595" height="485" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" style="border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;" allowfullscreen> </iframe>Release presentation at HITB+Cyberweek on 16 October 2019.
<iframe src="https://www.slideshare.net/slideshow/embed_code/key/9FqUwLVZaoLaxO" width="595" height="485" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" style="border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;" allowfullscreen> </iframe>An all new class where the ARM IoT EXPLOIT LABORATORY leaves off. The ARM IoT Firmware Laboratory dives into analysis, extraction and emulation of IoT device firmware, using a variety of techniques. Students shall be given ample hands on practice in emulating a variety of IoT devices. Lab exercises feature firmware extraction directly from the hardware, building a custom kernel and buildroot environment, extracting contents of nvram and emulating the device under ARM-X. The class also goes on to fuzzing and exploit development exercises for the emulated devices.
-
HITB2020AMS, Amsterdam: (3 day class) https://conference.hitb.org/hitbsecconf2020ams/sessions/3-day-training-1-the-arm-iot-laboratory/
-
Ringzer0 2020, Las Vegas: (4 day class) https://ringzer0.training/arm-iot-firmwarelab.html
VMware VM: https://app.box.com/s/3iyi5f6vpakngh8ti3ir2zzukgdu0j2q
The ARM-X VM is compressed using 7-Zip. The archive is split into multiple files of 200MB each, because several cloud hosting providers impose a maximum limit. To extract the VM, use the 7z command line utility:
7z e armx-march2020.7z.001
SHA 256 Checksums:
286fbfcda02f5161d4fc983584873ccd5462c315a8c9783232cbef717c5c054e armx-march2020.7z.001
f513145ed451bc3e07014824deb9ffa5c66b0ebad97ba24aed500abcdea6f7f6 armx-march2020.7z.002
1a41f4a028db80787adbeac03bfb20794994f3658e67764c200d885498521d2f armx-mar2020.vmx
eba62de7c6235859e2150503a29f4bf84a85dd9dba5c5ba46e44940de6a03387 armx-s001.vmdk
5feeb87965d0e04dff31bbc6c61eb676e1a8c72c11076ba2167d960195391dd1 armx.vmdk
VirtualBox VM: (coming soon, but don't hold your breath)
Github: https://github.com/therealsaumil/armx/
Tutorial: Debugging With ARM-X
ARM-X is licensed under the Mozilla Public License v2.0 (MPLv2).
- v0.9.0 22-October-2019, Preview Release
- v0.9.1 19-November-2019
- v0.9.2 12-March-2020