Hacker News new | past | comments | ask | show | jobs | submit login

Yeah



are there tools for parsing the firmware bin? are they a threat vector?

is it like a settings file?


Every modern computer has many independent processors, and they all need to execute software from somewhere. Many of these independent processors load their software from some sort of onboard memory, others rely on the main processor to load their software. The second case is what these blobs are for the most part.


>are there tools for parsing the firmware bin?

Binwalk, IDA pro, etc. All the normal reverse engineering tools.

>are they a threat vector?

Absolutely.

>is it like a settings file?

No, it's code executing on the WiFi card.


> are there tools for parsing the firmware bin?

Besides a hex editor, probably not.

> are they a threat vector?

As much as any other opaque software (i.e. not FOSS or otherwise transparent around source code auditing by arbitrary third parties). That is, in short: yes.

> is it like a settings file?

No, it's more like the operating system for the wireless card itself, running on the card's own microprocessor.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: