|
https://cloud.189.cn/t/fUzURrjiIf6b (访问码:g3zf)
麻烦老哥帮忙分析一下是我那个环节出错了,为什么没有解压出文件系统
分区表:
Creating 7 MTD partitions on "raspi":
0x000000000000-0x000000800000 : "ALL"
0x000000000000-0x000000030000 : "Bootloader"
0x000000030000-0x000000040000 : "Config"
0x000000040000-0x000000050000 : "Factory"
0x000000050000-0x0000007b0000 : "Kernel"
0x0000007b0000-0x0000007f0000 : "modules"
0x0000007f0000-0x000000800000 : "buginfo"
第一步:自动分析编程器固件
hudengke@PCOS-2022TQKDLL:/mnt/e/ubuntu/wayos$ binwalk r700-3-ok.bin
DECIMAL HEXADECIMAL DESCRIPTION
--------------------------------------------------------------------------------
85280 0x14D20 U-Boot version string, "U-Boot 1.1.3 (Jan 8 2014 - 23:27:14)"
196620 0x3000C gzip compressed data, maximum compression, from Unix, last modified: 2022-10-27 07:11:24
327680 0x50000 uImage header, header size: 64 bytes, header CRC: 0xE0CCD185, created: 2016-08-30 20:40:46, image size: 7503026 bytes, Data Address: 0x80000000, Entry Point: 0x8000C2F0, data CRC: 0xEF572D3B, OS: Linux, CPU: MIPS, image type: OS Kernel Image, compression type: lzma, image name: "Linux Kernel Image"
327744 0x50040 LZMA compressed data, properties: 0x5D, dictionary size: 33554432 bytes, uncompressed size: 10598816 bytes
第二步:截取出内核文件
在地址为0x50040位置开始截取7503025(7503026-1得出)个字节,得到lzma格式压缩的内核,保存文件名为kernel.bin
hudengke@PCOS-2022TQKDLL:/mnt/e/ubuntu/wayos$ binwalk kernel.bin
DECIMAL HEXADECIMAL DESCRIPTION
--------------------------------------------------------------------------------
0 0x0 LZMA compressed data, properties: 0x5D, dictionary size: 33554432 bytes, uncompressed size: 10598816 bytes
第三步:使用binwalk自动解压,没有解压出文件
hudengke@PCOS-2022TQKDLL:/mnt/e/ubuntu/wayos$ binwalk -Me kernel.bin
Scan Time: 2022-11-07 19:32:17
Target File: /mnt/e/ubuntu/wayos/kernel.bin
MD5 Checksum: c51dd6e3805cd54acdef579f38938825
Signatures: 391
DECIMAL HEXADECIMAL DESCRIPTION
--------------------------------------------------------------------------------
0 0x0 LZMA compressed data, properties: 0x5D, dictionary size: 33554432 bytes, uncompressed size: 10598816 bytes
Scan Time: 2022-11-07 19:32:19
Target File: /mnt/e/ubuntu/wayos/_kernel.bin.extracted/0
MD5 Checksum: 74a6a109ac7e2a1b7e21198bd86ca5a1
Signatures: 391
DECIMAL HEXADECIMAL DESCRIPTION
--------------------------------------------------------------------------------
3612744 0x372048 Linux kernel version 2.6.36
3800960 0x39FF80 CRC32 polynomial table, little endian
3823664 0x3A5830 Base64 standard index table
4127268 0x3EFA24 xz compressed data
4151360 0x3F5840 Unix path: /var/run/udhcpc.pid
4202856 0x402168 HTML document header
4203186 0x4022B2 HTML document footer
4203304 0x402328 HTML document header
4203365 0x402365 HTML document footer
4206092 0x402E0C HTML document header
4206284 0x402ECC HTML document footer
4206448 0x402F70 HTML document header
4206817 0x4030E1 HTML document footer
4208424 0x403728 HTML document footer
4231419 0x4090FB Neighborly text, "neighbor %.2x%.2x.%pM lostde"
第四步:尝试使用unlzma解压
hudengke@PCOS-2022TQKDLL:/mnt/e/ubuntu/wayos$ cp kernel.bin kernel.lzma
hudengke@PCOS-2022TQKDLL:/mnt/e/ubuntu/wayos$ unlzma kernel.lzma #这一步骤倒是没有报错,执行后新生成一个kernel文件大小10.1M,原来截取的kernel.bin是7.15M
第五步:分析一下unlzma命令执行后新生成的文件kernel,,,后续不知道该怎么进行了。
hudengke@PCOS-2022TQKDLL:/mnt/e/ubuntu/wayos$ binwalk kernel
DECIMAL HEXADECIMAL DESCRIPTION
--------------------------------------------------------------------------------
3612744 0x372048 Linux kernel version 2.6.36
3800960 0x39FF80 CRC32 polynomial table, little endian
3823664 0x3A5830 Base64 standard index table
4127268 0x3EFA24 xz compressed data
4151360 0x3F5840 Unix path: /var/run/udhcpc.pid
4202856 0x402168 HTML document header
4203186 0x4022B2 HTML document footer
4203304 0x402328 HTML document header
4203365 0x402365 HTML document footer
4206092 0x402E0C HTML document header
4206284 0x402ECC HTML document footer
4206448 0x402F70 HTML document header
4206817 0x4030E1 HTML document footer
4208424 0x403728 HTML document footer
4231419 0x4090FB Neighborly text, "neighbor %.2x%.2x.%pM lostde"
|
|