Documentacao renderizada
Esta pagina renderiza o Markdown e Mermaid do modulo diretamente da fonte publica de documentacao.
Overview#
Binwalk is the leading open-source firmware analysis and extraction tool, automating the process of identifying embedded file systems, compressed archives, encryption markers, and executable code within firmware binary images. It is the first step in firmware reverse engineering workflows, identifying what is inside a firmware blob before deeper analysis tools like FKIE FACT are applied. Argus integrates Binwalk to track firmware analysis results at scale -- maintaining an inventory of firmware images analysed, their detected signatures, and extraction outcomes for supply chain security and IoT/OT vulnerability assessment workflows.
Key Features#
Firmware Submission and Signature Recording#
Submit firmware analysis results via
syncBinwalkFwExtraction, providing the firmware SHA256 hash, file name, file size, list of detected signatures, Shannon entropy measurement, and extraction path. Signatures identify what Binwalk found: cpio archive, gzip compressed data, Linux kernel, ELF binary, JFFS2 filesystem, OpenSSL certificate, LZMA compressed data, etc. Entropy indicates whether sections of the firmware are encrypted or compressed.
Entropy Analysis for Encryption Detection#
High Shannon entropy across a large firmware region is a strong indicator of encryption -- often a sign that a firmware vendor is protecting their embedded software, or in adversarial contexts, that malware injected into firmware is concealing its code. Low-entropy sections are candidate areas for string extraction and signature scanning. Entropy values are preserved per record and surfaced in the inventory.
Signature Coverage Inventory#
Query the firmware extraction inventory via
binwalkFwItems to see all analysed firmware files and their signature hits. This supports supply chain security auditing -- tracking which firmware images were analysed, what file systems and bootloaders they contain, and flagging images with no recognisable structures (potentially encrypted or corrupted).
Integration with YARA and FKIE FACT#
Binwalk extraction paths (identified compressed payloads, extracted file systems) flow into FKIE FACT for deep analysis -- FKIE FACT unpacks the extracted file systems, identifies binaries, and runs YARA rules and CVE lookups against embedded components. This two-stage pipeline (Binwalk → FKIE FACT) provides comprehensive firmware supply chain coverage.
Use Cases#
- IoT Device Firmware Auditing: Extract and analyse firmware from IoT devices deployed in operational environments to identify unpatched Linux kernels, default credential exposure, or unauthorised remote maintenance tools.
- Supply Chain Verification: Before deploying routing or switching hardware from a vendor, verify that the firmware signature profile matches expected content -- unusual encrypted sections or unknown file systems warrant deeper FKIE FACT analysis.
- Malware Implant Detection: Apply YARA rules to Binwalk-extracted filesystems to detect known firmware backdoor signatures (VPNFilter, Cyclops Blink, VOLT TYPHOON-related implants).
- OT Asset Security Assessment: Analyse firmware updates pushed to SCADA RTUs and PLCs to identify embedded components with known CVEs before deployment.
Integration#
Available via GraphQL:
binwalkFwItems, binwalkFwStats (queries); syncBinwalkFwExtraction (mutation). All operations require authentication and organisation scoping.
Works alongside FKIE FACT (deep component analysis), YARA Engine (pattern-based detection on extracted binaries), and the Data Source Catalog domain (tracking asset firmware versions).
Last Reviewed: 2026-03-18