Reverse Engineering Firmware Encryption of a Moxa Android Device

TLDRIn this video, we explore the process of reverse engineering the firmware encryption of a Moxa Android device. We learn how to decrypt the firmware and analyze its contents.

Key insights

💡Moxa W2150A is a serial to Wi-Fi gateway used in industrial and critical infrastructure operations

🛠️Reverse engineering the firmware involves analyzing the file structure, using tools like binwalk

🔑The firmware is encrypted with AES-128 ECB mode and requires a decryption key

🔬Analyzing the firmware involves examining functions like AES ECB encrypt and AES set decrypt key

🧩XOR operations are used for obfuscation in the firmware encryption scheme

Q&A

What is a Moxa W2150A?

Moxa W2150A is a serial to Wi-Fi gateway used in industrial and critical infrastructure operations.

How is the firmware encrypted?

The firmware is encrypted using AES-128 ECB mode.

What tools are used for reverse engineering?

Tools like binwalk and Ghidra are used for reverse engineering the firmware.

What is the purpose of XOR operations in the encryption scheme?

XOR operations are used for obfuscation in the firmware encryption scheme.

What are the key insights from the analysis?

The key insights include the device's usage in critical infrastructure, the encryption algorithm, and the functions involved in the encryption process.

Timestamped Summary

00:00Introduction to reverse engineering firmware encryption of a Moxa Android device

05:26Analyzing the file structure and format of the firmware

09:25Exploring XOR operations used for obfuscation

12:36Decrypting the firmware using a key and examining its contents

13:21Conclusion and overview of upcoming videos in the series