Summary of the concepts and techniques discussed in a firmware analysis series, along with technical notes and commands
This video, Part 1 of a three-part firmware analysis series by Tom Heb of Meta Red Team X, introduces what firmware is, why it's security-critical, and the initial two phases of firmware analysis: enumerate (figuring out what firmware exists) and obtain (getting a copy of the firmware).
Key Technical Details and Commands: