Investigations on the image of the recent post. I started my work based on https://boredpentester.com/reversing-esp8266-firmware-part-3/
esptool.py v4.9.0
File size: 4194304 (bytes)
Detected image type: ESP8266
Image version: 1
Entry point: 4010f494
2 segments
Segment 1: len 0x00d84 load 0x4010f000 file_offs 0x00000008 []
Segment 2: len 0x00028 load 0x3fff20b8 file_offs 0x00000d94 [DRAM]
Checksum: c9 (valid)
hexdump -s 0x1000 -v -C irwifi.firmware.bin |less
00001000 e9 05 03 20 c0 00 10 40 10 10 20 40 b8 b4 05 00 |… …@.. @….|
00001010 d0 43 06 00 d2 b8 de e2 c4 f4 6f cf ad 88 fe 3f |.C……..o….?|
00001020 b8 ec fe 3f ac ec fe 3f a0 ec fe 3f 98 ec fe 3f |…?…?…?…?|
00001030 28 ec fe 3f 20 ec fe 3f 12 c1 f0 c9 21 c1 f7 ff |(..? ..?….!…|
00001040 21 f8 ff 3d 0c 09 31 c5 e0 18 21 f6 ff 3d 0c 45 |!..=..1…!..=.E|
00001050 e0 18 21 f5 ff 0c 15 0c 04 0c 43 45 a5 1d 21 f3 |..!…….CE..!.|
00001060 ff 0c 06 0c f5 42 a0 64 32 a0 0e 05 3e 00 21 f0 |…..B.d2…>.!.|
00001070 ff 85 5b 0d 62 a0 ff 21 ef ff 5d 06 4d 06 60 36 |..[.b..!..].M.`6|
00001080 20 45 8b 17 08 31 c8 21 12 c1 10 0d f0 00 00 00 | E…1.!……..|
00001090 dc 87 fe 3f 05 88 fe 3f 3c ed fe 3f f1 87 fe 3f |…?…?<..?…?|
000010a0 0b 88 fe 3f 25 88 fe 3f 92 a0 c0 90 11 c0 22 a0 |…?%..?……".|
000010b0 84 1a 22 02 61 2f c2 61 2e d2 61 2d e2 61 2c 05 |..".a/.a..a-.a,.|