Skip to content

BoredPentester

Bored Pentester

A collection of spare time spent reverse engineering, hardware hacking and conducting vulnerability research.

25th October 2018 / Reverse Engineering

Reversing ESP8266 Firmware (Part 4)

Writing an IDA loader So, why a loader? The main reason was that I wanted something I could re-use when reversing future ESP8266 firmware dumps. Our loader will be quite simple. IDA loaders typically define the following functions: The first is responsible for identifying an applicable file, based on its signature and is executed when …

Continue Reading
25th October 2018 / Reverse Engineering

Reversing ESP8266 Firmware (Part 3)

What is it? So, what is the ESP8266? Wikipedia describes it as follows: The ESP8266 is a low-cost Wi-Fi microchip with full TCP/IP stack and microcontroller capability produced by Shanghai-based Chinese manufacturer, Espressif Systems. Moreover, Wikipedia alludes to the processor specifics: Processor: L106 32-bit RISC microprocessor core based on the Tensilica Xtensa Diamond Standard 106Micro …

Continue Reading
25th October 2018 / Reverse Engineering

Reversing ESP8266 Firmware (Part 2)

Initial analysis As with any unknown binary, our initial analysis will help to uncover any strings that may allude to what we’re looking at, as well as any signatures within the file that could present a point of further analysis. Lastly, we want to look at the hexadecimal representation of the file, in order to …

Continue Reading
26th October 2018 / Reverse Engineering

Reversing ESP8266 Firmware (Part 1)

During my time with Cisco Portcullis, I wanted to learn more about reverse engineering embedded device firmware. This six-part series was written both during my time with Cisco Portcullis, as well in my spare time (if the tagline of this blog didn’t give that away). This series intends to detail my analysis of an embedded …

Continue Reading

Posts pagination

  • Previous
  • 1
  • 2
©2025 BoredPentester - Powered by Simpleasy