• XSS.stack #1 – первый литературный журнал от юзеров форума

Видео Reverse Engineering and Exploit development in ARM

Nosymptoms

RAID-массив
Пользователь
Регистрация
28.07.2021
Сообщения
60
Реакции
109
Гарант сделки
2
Last updated 11/2021

What you'll learn​

  • Arm exploitation
  • Binary exploitation
  • Reverse engineering
  • Basic arm instructions
  • Gdb primer
  • Patching binaries
  • Ghidra,Binary ninja,Hopper etc
  • Exploit development
  • Format string vulnerabilities
  • Ret2zp Attack
  • Nx Bypass
  • Buffer overflow
  • Integer Overflow
  • Integer Underflow
  • Heap Overflow



    Requirements​

    • A PC
    • Basic programming concept(not necessary)
    • Some interest



      This course is focused on Arm v6 vulnerabilities and Exploitation (32 bit ).We will start off with some basic arm instructions and will move to the practical exploitation.The core sections of these course is Reverse engineering and binary exploitation.We will reverse and modify the behaviour of simple crackme programs using Ghidra,Binary ninja,Hopper etc.Then we will move into exploiting various binaries using format string vulnerabilities and buffer overflows.After that we will be look at the protections used by the binaries and bypassing them.We will be using ctf style examples mostly.As this is the part one of the course we will cover everything from the scratch.



Download link: https://mega.nz/file/Do8XGIia#GG5Gs254hlBMth4r6iEX8zqgBRU9o5R7p19d_uYXTV0
Tools and Source: https://mega.nz/file/S9VEXRLb#0Vzj32n4foFrO535D4nX3KEUo7_eHNFViIMYn3jtQp4

Pass: Downloadforfree

Source: https://www.udemy.com/course/reverse-engineering-and-binary-exploitation-in-arm/
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх