Published on: 2022-10-19 02:40:15
Categories: 28
Share:
Reverse Engineering and Exploit development in ARM published by Udemy Academy. An introduction to arm exploitation, part one.
Welcome to the cheapest and first arm tapping course on Udemy. This course is for beginners only. As you all know, arm-based devices are becoming more and more prominent these days, so it’s important to learn about securing them. I made this course a lot. It is practical so that it does not tire you while going. This course only requires a PC, we don’t need any raspberry pi or anything else we use simulated labs. This course is very basic and if you are already familiar with buffer. Format string overflows and exploits, this won’t help you much, but it can still help as a primer and as an introduction to ARM exploits.
This course focuses on Arm v6 Vulnerabilities and Exploitation (32-bit). We start with basic arm instructions and move on to practical operation. The main parts of this course are reverse engineering and binary exploitation. We will reverse and correct. Behavior of simple crack programs using Ghidra, Binary Ninja, Hopper, etc. We then move on to exploiting various binaries using thread and buffer overflow vulnerabilities. After that we will look at the protections used by the binaries and how to bypass them. Use more ctf style examples. Since this is the first part of the course, we will cover everything from the beginning. This course has a 30-day refund policy, so even if you don’t like the course, you can definitely get your money back 100%.
A PC
Basic programming concept(not necessary)
Some interest
After Extract, watch with your favorite Player.
English subtitle
Quality: 720p
5.64 GB
Sharing is caring: