Skip to content

Instantly share code, notes, and snippets.

@nstarke
Created May 12, 2019 14:56
Show Gist options
  • Save nstarke/7d12de1d209d9c699dc0bbc481837848 to your computer and use it in GitHub Desktop.
Save nstarke/7d12de1d209d9c699dc0bbc481837848 to your computer and use it in GitHub Desktop.
Extract Netgear .chk Firmware

Extract Netgear .chk Firmware

I recently ran into a situation where binwalk -M -e $FIRMWARE failed me. This was for a Netgear firmware image that ended in a .chkextension.

The firmware file name was R7960P-V1.0.1.34_1.0.20.chk.

This is the output when I ran binwalk R7960P-V1.0.1.34_1.0.20.chk:

$ binwalk R7960P-V1.0.1.34_1.0.20.chk

DECIMAL       HEXADECIMAL     DESCRIPTION
--------------------------------------------------------------------------------
58            0x3A            JFFS2 filesystem, little endian
4063290       0x3E003A        UBI erase count header, version: 1, EC: 0x0, VID header offset: 0x800, data offset: 0x1000

We need the UBIFS portion of the .chk file, so either use binwalk -M -e R7960P-V1.0.1.34_1.0.20.chk or use dd to manually extract that portion of the image.

If you use binwalk you will see a folder with a file in it: _R7960P-V1.0.1.34_1.0.20.chk.extracted/3E003A.ubi.

Now this UBIFS blob contains a squahsfs image. We need to extract that image instead of trying to extract files from the ubifs itself.

To accomplis this we will need https://github.com/jrspruitt/ubi_reader, which can be installed via pip: sudo pip install ubi_reader.

Execute $ ubireader_extract_images _R7960P-V1.0.1.34_1.0.20.chk.extracted/3E003A.ubi

This will create a directory with a file in it: ubifs-root/3E003A.ubi/img-1531400273_vol-rootfs_squashfs.ubifs.

Now all we have to do is use binwalk to extract the squashfs filesystem:


$ binwalk -e ubifs-root/3E003A.ubi/img-1531400273_vol-rootfs_squashfs.ubifs

DECIMAL       HEXADECIMAL     DESCRIPTION
--------------------------------------------------------------------------------
0             0x0             Squashfs filesystem, little endian, version 4.0, compression:xz, size: 36995096 bytes, 2192 inodes, blocksize: 131072 bytes, created: 2019-02-24 22:58:06

That leave you with an extract squashfs file system:

ls ubifs-root/3E003A.ubi/_img-1531400273_vol-rootfs_squashfs.ubifs.extracted/squashfs-root 
bin/     data/   dev/  lib/    misc3/  mnt/  proc/  share/  tmp@  var/   www/
bootfs/  debug@  etc/  lib64/  misc5/  opt/  sbin/  sys/    usr/  webs/

Happy hacking!

@chvryT
Copy link

chvryT commented Aug 1, 2019

when i ran ubireader_extract_images _R7960P-V1.0.1.34_1.0.20.chk.extracted/3E003A.ubi in my kali,it say,

@chvryT
Copy link

chvryT commented Aug 1, 2019

it says,read Error,block ends at 42598400 which is greater than file size 42467348
extract_block Fatal: PEB:324:Bad Read Offset Request
how could i reslove it,thanks very muchu!

@motionthings
Copy link

Worked flawlessly on the firmware for an RAX50 (AX5400) :-)
Thank you very much.

@francoataffarel
Copy link

Hello sir, now how to emulate ?

@WraithBand
Copy link

Hello !
Can someone explain what to do to rebuild the .chk after the steps described above ?

@nstarke
Copy link
Author

nstarke commented Apr 20, 2022

@WraithBand I'll try to take a look at that sometime in the next few weeks and get you some details. Feel free to ping me again if it appears I forgot. Thanks.

@WraithBand
Copy link

@nstarke Thank you so much !!! I've managed to extract the FS from the RAX40V2 so I have an UBIFS then a SQUASHFS but I dont know how to rebuild from there.

@HAHALOSAH
Copy link

How do I rebuild?

@nstarke
Copy link
Author

nstarke commented Apr 26, 2022

@HAHALOSAH haven't had time to look into this. won't have time for a few more weeks. if you need it sooner I suggest firing up a hex editor and start diffing headers. the actual contents should be simple to rebuild, it'll be the headers that need to be precise.

@kriptosec
Copy link

Hi, Can I ask how to emulate?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment