Understand how Threat Led Penetration Testing (TLPT) establishes a foundation for DORA compliance Watch the video›

Offensive Tools

Sonicrack

Sonicrack automatically extract keys from VMware virtual machine bundles and decrypt VMware NSv firmware images.

About Sonicrack

SonicOSX firmware decryption

Sonicrack automatically extract keys from VMware virtual machine bundles and decrypt VMware NSv firmware images.

Our intent behind releasing Sonicrack is to make the current generation of SonicWall firewalls more accessible for good-faith security research. After all, if our small team of researchers can successfully decrypt the firmware, well-funded nation-state actors have certainly done the same. It is our belief that tools like this one help to level the playing field for those who work to protect consumers from malicious adversaries.

Bishop Fox Researcher Jon Williams Headshot with pixel purple fox.

Senior Security Engineer

Jonathon Williams

As a researcher for the Bishop Fox Capability Development team, Jon spends his time hunting for vulnerabilities and writing exploits for software on our customers' attack surface. He previously served as an organizer for BSides Connecticut for four years and most recently completed the Corelan Advanced Windows Exploit Development course. Jon has presented talks and written articles about his security research on various subjects, including enterprise wireless network attacks, bypassing network access controls, and malware reverse engineering.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.