To help explain how attackers reverse engineer device firmware, this walkthrough takes a piece of firmware from a binary file to an extracted file system you can explore on your own. For more information check out
http://1585security.com/Firmware-Reversing-1/
This video is part of the Figurable project, which is geared toward people who are curious about IoT security and looking for that first bite of the apple.