pip install -r requirements.txt
- Miasm v0.1.1:
git clone --depth=1 --branch=v0.1.1 https://github.com/cea-sec/miasm
The src/emulate_mbr.py
script can emulate the bootloader, and has some
options to carry some experiments:
$ python /path/to/emulate_mbr --help Usage: emulate_mbr.py [options] disk.raw Options: -h, --help show this help message and exit --dry Dry run: do not write modifications to disk --skip-encryption Do not execute the encryption code (leave the data in clear) --verbose-bios Verbose message from the BIOS --verbose-bios-data Verbose message from the BIOS, including data read/written throught the BIOS interrupts --log-miasm-newblocks Miasm: log new encountered blocks --emulate-encrypted-hdd Emulate the fact that the hard drive has already been encrypted --dump-keystream Dump the keystream used for encryption --hook=HOOK Hook to set after encryption: find_key (find key in memory), patch_bootloader (patch the bootloader to use the key still in memory) or none (default)
The disk.raw.bz2
file is a disk example with a NotPetya bootloader and a
simple NTFS partition. Beware that the size of the decompressed file is ~1GB.
- lafouine <[email protected]>
- Adrien Guinet <[email protected]>