Summary
In this chapter, we saw how to interface a baseband firmware with Avatar2 and understood some basic reverse engineering steps required to approach an unknown firmware image. If you were able to see some output, you might be able to imagine what it takes to build an entire emulator for that modem.bin
that we used for the test.
In the next chapter, we will push it further and leverage the effort from team FirmWire to refine a known vulnerability of Samsung basebands. We will use both the emulator and a real Over-The-Air (OTA) setup, including a mobile Base Station (BTS) and a mobile phone, to validate the vulnerability we have found.