[email protected]

Announcements related to the open source fwaudit tool from PreOS Security

View all threads

fwaudit status update and release 0.0.2

AR
Announcements related to the open source fwaudit tool from PreOS Security
Sat, Aug 4, 2018 8:10 PM

Hi,

Today I pushed the last monolithic update to Git, and tagged release
0.0.2. For future releases, expect smaller, more regular updates, soon
with GPG key integration.

Since the last release, Apple MacOS support should now work, Linux
syslog works, non-root use via sudo now saves files in the user's
homedir instead of the /root/ home directory.

Windows and UEFI Shell targets are not ready for use yet. The current
release has boken the sidecar hash and manifest files. I'll have this
working in a few days. A few of the CHIPSEC and FWTS commands appear to
have issues, and need more testing.

Personally, I'd hold off on using fwaudit until a few days after
Blackhat, I expect multiple bugfixes in the next few days.

As the docs say, if you find an issue that is not listed in the docs or
have an "XXX" comment or debug comment in the code, please feel free to
send email to the fwaudit-discuss mailing list, or file a bug on the
Github site.

Code aside, we'll be demo'ing fwaudit at Black Hat USA 2018 Tools
Arsenal next week[1]. If you're going to Black Hat, please drop by and
say hello! Wednesday, August 8th, 2:30pm-3:50pm, at Tools Arsenal Station 5.

Code and Black Hat aside, there's now a fwaudit-discuss mailing list[2],
in addition to this announce-only list.

Thanks,
Lee Fisher

PS: Our local hackerspace just got a CNC machine, and we're learning how
to create a metal challenge coin. I'm planning on a "fwaudit project
contributor" coin, seeking an SVG-aware artist to help with coin artwork.
 
[1]
https://www.blackhat.com/us-18/arsenal/schedule/#firmware-audit-platform-firmware-security-automation-for-blue-teams-and-dfir-11359

[2]
https://lists.preossec.com/mailman/listinfo/fwaudit-discuss_lists.preossec.com

Hi, Today I pushed the last monolithic update to Git, and tagged release 0.0.2. For future releases, expect smaller, more regular updates, soon with GPG key integration. Since the last release, Apple MacOS support should now work, Linux syslog works, non-root use via sudo now saves files in the user's homedir instead of the /root/ home directory. Windows and UEFI Shell targets are not ready for use yet. The current release has boken the sidecar hash and manifest files. I'll have this working in a few days. A few of the CHIPSEC and FWTS commands appear to have issues, and need more testing. Personally, I'd hold off on using fwaudit until a few days after Blackhat, I expect multiple bugfixes in the next few days. As the docs say, if you find an issue that is not listed in the docs or have an "XXX" comment or debug comment in the code, please feel free to send email to the fwaudit-discuss mailing list, or file a bug on the Github site. Code aside, we'll be demo'ing fwaudit at Black Hat USA 2018 Tools Arsenal next week[1]. If you're going to Black Hat, please drop by and say hello! Wednesday, August 8th, 2:30pm-3:50pm, at Tools Arsenal Station 5. Code and Black Hat aside, there's now a fwaudit-discuss mailing list[2], in addition to this announce-only list. Thanks, Lee Fisher PS: Our local hackerspace just got a CNC machine, and we're learning how to create a metal challenge coin. I'm planning on a "fwaudit project contributor" coin, seeking an SVG-aware artist to help with coin artwork.   [1] https://www.blackhat.com/us-18/arsenal/schedule/#firmware-audit-platform-firmware-security-automation-for-blue-teams-and-dfir-11359 [2] https://lists.preossec.com/mailman/listinfo/fwaudit-discuss_lists.preossec.com
AR
Announcements related to the open source fwaudit tool from PreOS Security
Sun, Aug 5, 2018 2:23 AM

We might be a little noisy leading up to Black Hat.

Today's second release, 0.0.3 adds INTEL-SA-00075-Discovery-Tool for CVE-2017-5689, the AMT vulnerability.

Thanks for listening!

Paul

We might be a little noisy leading up to Black Hat. Today's second release, 0.0.3 adds INTEL-SA-00075-Discovery-Tool for CVE-2017-5689, the AMT vulnerability. Thanks for listening! Paul