Skip to content
This repository has been archived by the owner on May 13, 2024. It is now read-only.
/ trommel Public archive

TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators

License

Notifications You must be signed in to change notification settings

CERTCC/trommel

Repository files navigation

TROMMEL

TROMMEL sifts through embedded device files to identify potential vulnerable indicators.

TROMMEL identifies the following indicators related to:

  • Secure Shell (SSH) key files
  • Secure Socket Layer (SSL) key files
  • Internet Protocol (IP) addresses
  • Uniform Resource Locator (URL)
  • email addresses
  • shell scripts
  • web server binaries
  • configuration files
  • database files
  • specific binaries files (i.e. Dropbear, BusyBox, etc.)
  • shared object library files
  • web application scripting variables, and
  • Android application package (APK) file permissions.

TROMMEL has also integrated vFeed which allows for further in-depth vulnerability analysis of identified indicators to enrich the output.

Dependencies

  • Python-Magic - See documentation for instructions for Python3-magic installation
  • vFeed Database - For non-commercial use, register and download the Community Edition database

Usage

$ trommel.py --help

Output TROMMEL results to a file based on a given directory. By default, only searches plain text files.

$ trommel.py -p /directory -o output_file

Output TROMMEL results to a file based on a given directory. Search both binary and plain text files.

$ trommel.py -p /directory -o output_file -b

Notes

  • The intended to assist researchers during firmware analysis to find potential vulnerabilities
  • Network defenders can benefit as well to assess devices on their network or for devices they plan to add to their network
  • Devices can include IoT (web cams, smart devices (light bulbs, plugs, switches, TVs, fridge, coffee maker, etc.)), SCADA/ICS, routers, really anything with an embedded flash chip that boots an OS on startup.
  • TROMMEL has been tested using Python3 on Kali Linux x86_64.

References

Author

  • Kyle O'Meara - komeara AT cert DOT org and @cool_breeze26

About

TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators

Resources

License

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published