Skip to content

Latest commit

 

History

History
44 lines (29 loc) · 1.16 KB

README-analysis.md

File metadata and controls

44 lines (29 loc) · 1.16 KB

Running the BANG analysis scripts

BANG is conceptually split into three parts:

  1. firmware unpacker
  2. knowledgebase maintenance scripts
  3. analysis scripts

This README covers the analysis scripts.

The analysis scripts work on the results of the firmware unpacker and (optionally) use data from the knowledgebase generated with the maintenance scripts.

Currently there are the following analysis scripts as "proof of concept":

  • apk_identifier
  • cve_finder
  • nsrl_lookup

apk_identifier

The script, configuration and more information can be found in the directory apk_identifier.

This script searches the BANG results for any APK (Android packages) and runs apkid on every APK that is found. For this the script needs access to the original scan data.

cve_finder

The script, configuration and more information can be found in the directory cve.

This script searches the BANG results and runs cve-bin-tool on every ELF file that was detected.

nsrl_lookup

The script, configuration and more information can be found in the directory nsrl.

This script searches the BANG results and runs a query on the NSRL database for every file that is found.