securefirmware

@securefirmware@infosec.exchange
192 Followers
114 Following
191 Posts
@securefirmware EMBA on the SBOM
It is f**** awesome to see job posting where EMBA is listed as one of the needed tools :)
EMBA reached the next milestone. 3000 GitHub stars accomplished. This is such a big Thing for us. A very big THANK YOU to the team and to our great community. Keep on going and test your Firmware, build SBOMs and make the Internet more secure ... With EMBA on the rocks

Most known bugs fixed and we are ready for a testing phase before the next EMBA release. Check it out and give us feedback about all the old and new bugs. Your chance to kill our time line ;)

Start with:
git clone https://github.com/e-m-b-a/emba.git
cd emba
sudo ./installer.sh -d

GitHub - e-m-b-a/emba: EMBA - The firmware security analyzer

EMBA - The firmware security analyzer. Contribute to e-m-b-a/emba development by creating an account on GitHub.

GitHub
Looks as an interesting paper on emulation is coming up "Challenges and pitfalls while emulating six current Icelandic household routers" - "The most effective tool for both analysis and emulation is EMBA." https://skemman.is/handle/1946/50456?locale=en
Exploring EMBA: Unraveling Firmware Security with Confidence - Eclypsium | Supply Chain Security for the Modern Enterprise

EMBA represents a significant step forward in the realm of firmware security analysis. In a world where our reliance on interconnected devices continues to grow, understanding and securing the firmware supply chain is no longer optional.

Eclypsium | Supply Chain Security for the Modern Enterprise
EMBA got a massive performance boost. Check the updated SBOM performance and enjoy the power
Currently there is so much stuff happening around EMBA ... today I can share that we got the chance to share the latest EMBA and #SBOM stuff at the #TROOPERS25 / @WEareTROOPERS security conference. Check it out here https://troopers.de/troopers25/agenda/
TROOPERS25

TROOPERS is more than just an infoSec con. Hands-on, high-end knowledge sharing leaves you motivated and charged to

The latest EMBA Pull Request for our system emulation engine from our contributor Endri (https://www.linkedin.com/in/endri-hoxha-990b7b239/) is so awesome ...

The original Firmadyne/FirmAE kernel that was used in our emulation engine was version 4.1.17 and is from Jan-2016.

The updated EMBA kernel is currently version 4.1.52 from May-2018 (a two year time-travel).

This PR introduces kernel 4.14.336 from Jan-2024 (8 years update from the initial Firmadyne/FirmAE kernel).

Our system emulation engine is now more up to date than ever before. See PR https://github.com/e-m-b-a/emba/pull/1575

Further details about the EMBA emulation engine are available here (updates will follow) https://github.com/e-m-b-a/emba/wiki/System-emulation

I just realized that
@heisec has written a nice article about some vulnerabilities we reported to Siemens in the Sentron PAC1260 device. Check it out here https://www.heise.de/en/news/Root-vulnerabilities-in-Siemens-Sentron-7KT-PAC1260-Data-Manager-remain-open-10350171.html
Root vulnerabilities in Siemens Sentron 7KT PAC1260 Data Manager remain open

Because support for a Siemens multi-channel current meter has expired, there are no more security updates.

heise online