In this video walkthrough, we covered analyzing firmware images and scanning it for vulnerabilities and security misconfigurations using BugProve as an effective firmware vulnerability scanner. We explored the various features that include a dissection of the discovered vulnerabilities, weak binaries along with a graphical representation of the severity related to each vulnerability.
*****
Receive Cyber Security Field, Certifications Notes and Special Training Videos
/ @motasemhamdan
******
BugProve
https://bugprove.com/
Writeup
https://motasem-notes.net/firmware-vu...
********
LinkedIn
[1]: / motasem-hamdan-7673289b
[2]: / motasem-eldad-ha-bb42481b2
Instagram
/ dev.stuxnet
Twitter
/ manmotasem
Facebook
/ motasemhamdantty