UEFI_RETool - A tool for UEFI firmware reverse engineering

(414 views)

UEFI firmware analysis with uefi_retool.py script Usage: Copy ida_plugin/uefi_analyser.py script and ida_plugin/uefi_analyser directory to IDA plugins directory Edit config.json file PE_DIR is a directory that contains all executable images from the UEFI firmware DUMP_DIR is a directory that contains all components from the firmware filesystem LOGS_DIR is a directory for logs IDA_PATH and IDA64_PATH are paths to IDA Pro executable files Run pip install -r requirements.txt Run python uefi_retool.py the command to display the help message Commands python uefi_retool.py Usage: uefi_retool.py [OPTIONS] COMMAND [ARGS]... Options: --help Show this message and exit. Commands: get-images Get executable images from UEFI firmware. get-info Analyze the entire UEFI firmware. get-pp Get a list of proprietary protocols in the UEFI firmware. get-images python uefi_retool.py get-images --help Usage: uefi_retool.py get-images [OPTIONS] FIRMWARE_PATH Get executable images from UEFI firmware. Images are stored in "modules" directory. Options: --help Show this message and exit. Example: python uefi_retool.py get-images test_fw/fw-tp-x1-carbon-5th.bin get-info....

August 6, 2020
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.