Now that we know how to reverse engineer firmware and extract the filesystem from it, in this section, we will look at the filesystem contents and perform additional vulnerability analyses on it. This will help us gain a deeper understanding of how to find security issues in firmware images, using which, we will be able to compromise an IoT device.
Analyzing filesystem contents
Getting ready
There are two approaches to analyzing filesystem contents:
- Manual analysis.
- Automated tools and scripts.
Manual analysis
In this approach of hunting for vulnerabilities within the...