Git Product home page Git Product logo

Comments (6)

levi-blodgett avatar levi-blodgett commented on June 19, 2024

It is also possible this could be happening on other OSes, but I don't have the ability to test those right now so would need someone else to confirm if the installer sets up the quest container properly.

from emba.

m-1-k-3 avatar m-1-k-3 commented on June 19, 2024

We improved the online check since the last release. Could you please test the latest master?

from emba.

BenediktMKuehne avatar BenediktMKuehne commented on June 19, 2024

The Quest container is a separate container for the Q-modules, which require internet connection.
Currently, @m-1-k-3 is working on a fix where the container doesn't work correctly behind a proxy.
Might this also be the case here?

from emba.

levi-blodgett avatar levi-blodgett commented on June 19, 2024

We improved the online check since the last release. Could you please test the latest master?

This was it, I figured that the tagged versions were what should be used like "stable" releases, but didn't realize that since there is just the one tag of the docker image that the master branch should probably always be used, and that the master branch is always supposed to be stable.

Would either of you be opposed if I opened up an MR for updating some of the documentation from what I have learned?


This is a separate question for clarification that I couldn't really understand from the docs, specifically about dangers of running full emulation:

If I am running EMBA with full emulation, which components of my setup have potential to be harmed?

Example setup:

  • A server where sudo ./installer.sh -d has been ran inside an up to date EMBA repo on master branch.

User calls EMBA with:

  • sudo ./emba -l ./logs -f ./firmware -p ./scan-profiles/default-scan-emulation.emba

Which would be in danger of being harmed, the server (host?), the network the server is hosted on, and/or the docker image that EMBA is running inside of?

From the docs it seems like the server (host?) is in danger of being harmed, but I am not sure why that is the case if the docker image is the one executing EMBA and doing the pentesting. If anyone is able to explain, I would like to add a version of that explanation into the docs.

from emba.

m-1-k-3 avatar m-1-k-3 commented on June 19, 2024

This was it, I figured that the tagged versions were what should be used like "stable" releases, but didn't realize that since there is just the one tag of the docker image that the master branch should probably always be used, and that the master branch is always supposed to be stable.

Would either of you be opposed if I opened up an MR for updating some of the documentation from what I have learned?

Does it work to open a PR for the Wiki? If so, please do it.

This is a separate question for clarification that I couldn't really understand from the docs, specifically about dangers of running full emulation:

If I am running EMBA with full emulation, which components of my setup have potential to be harmed?

Which would be in danger of being harmed, the server (host?), the network the server is hosted on, and/or the docker image that EMBA is running inside of?

From the docs it seems like the server (host?) is in danger of being harmed, but I am not sure why that is the case if the docker image is the one executing EMBA and doing the pentesting. If anyone is able to explain, I would like to add a version of that explanation into the docs.

The EMBA docker container is mostly read-only, the network (which is currently used for CVE-search) is isolated and the container is destroyed after execution. Nevertheless, the container is running in privileged mode and ...

... we have two emulation environments available in EMBA:

  • 1st: User-mode emulation is primarly used for improving the SBOM, vulnerability and exploit detection. In this mode you are directly running untrusted code from the firmware in the docker container (within a chroot user-mode qemu). This could result in a breakout of the chroot, compromise of the container, escape from the container or attack your report and finally as a worst case szenario your host.
  • 2nd: System-mode emulation is used to boot the complete firmware in qemu. which is also untrusted and can be used to perform further attacks in the qemu environment. Again, as worst case szenario an attacker could use a manipulated firmware to perform further attacks.

from emba.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.