Vault 7: Projects

This publication series is about specific projects related to the Vault 7 main publication.

SECRET//20350112
13.2 (S) Firmware Inspection..........................................................................................124
13.3 (S) Gaining a Shell..................................................................................................124
13.4 (S) Network Emissions and Packet Analysis...........................................................125
14 (U) FAQ..........................................................................................................126
14.1 (U) Why can’t I edit a Mission after it has been assigned?.....................................126
14.2 (U) Why can’t I remove/delete a Mission?..............................................................126
14.3 (U)What’s the difference between the Alerts page and the Target Activity page?. 126
14.4 (S) What’s a derived MAC?....................................................................................126
14.5 (S) Why Are Expected Beacon Times Off Slightly?...............................................126
15 (U) REFERENCE...........................................................................................127
15.1 (U) Flytrap <-> CherryTree Communication Details.............................................127
15.1.1 (U) Messaging Protocol.......................................................................................127
15.1.2 (U) Flytrap Status Data.........................................................................................128
15.1.3 (U) Flytrap Security Data......................................................................................129
15.1.4 (S) Authentication, Encryption, and Covert Communication...............................129
15.2 (U) Beacon Logic....................................................................................................130
15.3 (U) Data Storage (RAM, NVRAM, Firmware Image)............................................135
15.4 (S) Generic Filter (GF) Search Algorithm Details..................................................136
15.4.1 (S) Email Search...................................................................................................136
15.4.2 (S) Chat Search.....................................................................................................136
15.5 (S) Image Formation................................................................................................137
15.5.1 (U) Device Requirements.....................................................................................137
15.5.2 (U) Parameters That Must Be Decided Before Forming an Image......................138
15.6 (U) Manual Operation of Flytrap Software.............................................................139
15.7 (S) Default Gateway Discover (DGD) Details........................................................140
16 APPENDIX: FIRMWARE UPGRADE PROCEDURES.................................143
16.1 Firmware Upgrade Procedures: Belkin F5D8231-4 v4 fw 4.00.16.........................144
16.2 Firmware Upgrade Procedures: D-Link DIR-130 v1 fw 1.12 (and 1.10)..............153
16.3 Firmware Upgrade Procedures: Linksys WRT54G v5 fw 1.02.0...........................156
16.4 Firmware Upgrade Procedures: Linksys WRT54GL v1 fw 4.30.11 ETSI (et. al.). 159
16.5 Firmware Upgrade Procedures: Linksys WRT320N v1 fw 1.00.03.......................162
16.6 Firmware Upgrade Procedures: Linksys WRT300N v2 fw 2.00.08.......................165
16.7 Firmware Upgrade Procedures: Linksys WRT54GL v1 ........................................173
6
SECRET//20350112

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh