The article will explore various strategies for reversing
firmware, with some examples. Finally, some best practices are
mentioned.
LINK here: http://resources.infosecinstitute.com/reversing-firmware-part-1/
LINK here: http://resources.infosecinstitute.com/reversing-firmware-part-1/
Comments