All Courses

Reverse Engineering and Exploit development in ARM

Reverse Engineering and Exploit development in ARM Introduction to Arm exploitation Part one
Reverse Engineering and Exploit development in ARM Introduction to Arm exploitation Part one

Reverse Engineering and Exploit development in ARM

Introduction to Arm exploitation Part one

What you’ll learn

Reverse Engineering and Exploit development in ARM

  • Arm exploitation
  • Binary exploitation
  • Reverse engineering
  • Basic arm instructions
  • Gdb primer
  • Patching binaries
  • Ghidra, Binary ninja, Hopper, etc
  • Exploit development
  • Format string vulnerabilities
  • Ret2zp Attack
  • Nx Bypass
  • Buffer overflow
  • Integer Overflow
  • Integer Underflow

Requirements

  • A PC
  • Basic programming concept(not necessary)
  • Some interest

Description

Hello,

Welcome to the cheapest and first course of Arm exploitation in Udemy.This course is purely for beginners. As you all know arm based devices are becoming more and more prominent these days so it’s important to learn about securing them.
I made this course highly practical so that it doesn’t bore you as you go. This course Only requires just a PC we shouldn’t be needing any raspberry pi or anything we will using emulated labs. Course is very basic and if you are already familiar with buffer overflows and format string exploitation this wouldn’t be much help to you but still, this can help you as a primer and as an introduction to ARM exploitation.

This course is focused on Arm v6 vulnerabilities and Exploitation (32 bit ). We will start off with some basic arm instructions and will move to practical exploitation. The core sections of this course are Reverse engineering and binary exploitation. We will reverse and modify the behavior of simple crack me programs using Ghidra, Binary ninja, Hopper, etc. Then we will move into exploiting various binaries using format string vulnerabilities and buffer overflows. After that, we will be looking at the protections used by the binaries and bypassing them. We will be using CTF style examples mostly. As this is part one of the course we will cover everything from the scratch. This course has a 30-day refund policy so even if you don’t like this course you can just surely get your money 100%.

(NB: It’s an ongoing course new contents will be added)

I suggest you watch the sample videos and then deciding to buy this.

Who this course is for:

  • Anyone interested in learning binary exploitation
  • Hackers
  • CTF players
  • Reverse engineers
  • Last updated 5/2021

Content From: https://www.udemy.com/course/reverse-engineering-and-binary-exploitation-in-arm/
Download Now Arm assembly for Hackers Course

Friendly Website



Advertisement




Categories

Advertisement