Exploiting ARM-based IoT Devices
Uncover the secrets of ARM Assembly Prime, delve into Stack Base Buffer Overflow, master Shellcoding Tips and Tricks, and grasp the intricacies of Return Oriented Programming.
What's in the Course?
-
Introduction to ARM
-
Intro to Memory corruption Vulnerabilities
-
Some tips on crafting ARM Shellcode
-
Introduction to Return Oriented Programming
-
Ability to write ARM assembly
-
Exploit basic vulnerabilities
What you will Learn
Dive deep into ARM Assembly Prime, Stack Base Buffer Overflow, Shellcoding Tips and Tricks, and Return Oriented Programming. From the fundamentals of ARM architecture to crafting powerful shellcode, this course empowers you with practical knowledge to exploit ARM-based IoT devices.
Overview
ARM assembly language is at the forefront of IoT device exploitation, serving as a critical skill for cybersecurity professionals and ethical hackers. Given ARM's prevalence in the architecture of many IoT devices, understanding ARM assembly becomes paramount for those seeking to identify vulnerabilities and secure these interconnected technologies.
Course contents
Meet the instructor
Munnawar Shelia
A seasoned Security Researcher at Payatu, Munnawar Shelia is an expert in identifying security flaws in firmware and embedded devices. His professional expertise encompasses a range of captivating interests, including Reverse Engineering, Malware Analysis, Fuzzing, and Exploit Development. Beyond his corporate responsibilities, Munnawar is a passionate advocate for knowledge-sharing within the cybersecurity community and has delivered training sessions at various cybersecurity conferences.
In his blog taintedbits.com, Munnawar shares his experiences and expertise in malware analysis, Capture The Flag (CTF) challenges, and other security-related topics.
To sum it up, Munnawar Shelia is not just a Security Researcher; he's a digital detective, hacking and writing his way through the cyber maze, leaving no vulnerability unturned.