1. Offensive ARM Exploitation

    • Buy now
    • Learn more
  2. Module 1: Getting Started with ARM Internals

    Delayed 0 days

    • Introduction to the training class
    • Understanding ARM and Internals
    • ARM Assembly Fundamentals
    • Setting up our lab environment
    • Compiling ARM binaries
    • Solving ARM Crackme and PWNDBG
    • Introduction to Binary Ninja
    • Downloads for Module 1
  3. Module 2: ARM Reverse Engineering and Exploitation

    • Reversing ARM Binaries and Understanding Disassembly
    • Reversing Crypto in a Complex ARM Binary
    • Binary Exploitation in ARM
    • Understanding ARM Processes
    • Stack Based Overflow Exploitation in ARM
    • Exploiting Format Strings for InfoLeaks
    • Writing ARM Assembly
    • Writing Advanced ARM Assembly
  4. Module 3 : Advanced ARM Exploitation

    • Advanced Stack Overflow
    • Heap Analysis
    • Heap Based Buffer Overflow Exploitation
    • GOT (Global Offset Table) Overwriting
    • Double Free Attacks - 1
    • Double Free Attack - 2
  5. Exploit Mitigation Techniques in ARM and Bypassing Techniques

    • Introduction to Stack Canaries
    • Defeating Stack Canaries
    • Introduction to XN
    • Exploiting NX with Ret2ZP
    • ROP based Exploitation
    • Introduction to ASLR
    • Bypassing ASLR Protection
  1. Products
  2. Course
  3. Section

Exploit Mitigation Techniques in ARM and Bypassing Techniques

  1. Offensive ARM Exploitation

    • Buy now
    • Learn more
  2. This section is delayed by 0 days.

    Module 1: Getting Started with ARM Internals

    • Introduction to the training class
    • Understanding ARM and Internals
    • ARM Assembly Fundamentals
    • Setting up our lab environment
    • Compiling ARM binaries
    • Solving ARM Crackme and PWNDBG
    • Introduction to Binary Ninja
    • Downloads for Module 1
  3. Module 2: ARM Reverse Engineering and Exploitation

    • Reversing ARM Binaries and Understanding Disassembly
    • Reversing Crypto in a Complex ARM Binary
    • Binary Exploitation in ARM
    • Understanding ARM Processes
    • Stack Based Overflow Exploitation in ARM
    • Exploiting Format Strings for InfoLeaks
    • Writing ARM Assembly
    • Writing Advanced ARM Assembly
  4. Module 3 : Advanced ARM Exploitation

    • Advanced Stack Overflow
    • Heap Analysis
    • Heap Based Buffer Overflow Exploitation
    • GOT (Global Offset Table) Overwriting
    • Double Free Attacks - 1
    • Double Free Attack - 2
  5. Exploit Mitigation Techniques in ARM and Bypassing Techniques

    • Introduction to Stack Canaries
    • Defeating Stack Canaries
    • Introduction to XN
    • Exploiting NX with Ret2ZP
    • ROP based Exploitation
    • Introduction to ASLR
    • Bypassing ASLR Protection

7 Lessons
    • Introduction to Stack Canaries
    • Defeating Stack Canaries
    • Introduction to XN
    • Exploiting NX with Ret2ZP
    • ROP based Exploitation
    • Introduction to ASLR
    • Bypassing ASLR Protection