Exploiting ARM-based IoT Devices

Uncover the secrets of ARM Assembly Prime, delve into Stack Base Buffer Overflow, master Shellcoding Tips and Tricks, and grasp the intricacies of Return Oriented Programming.

What's in the Course?

  • Introduction to ARM
  • Intro to Memory corruption Vulnerabilities
  • Some tips on crafting ARM Shellcode
  • Introduction to Return Oriented Programming
  • Ability to write ARM assembly
  • Exploit basic vulnerabilities

What you will Learn

Dive deep into ARM Assembly Prime, Stack Base Buffer Overflow, Shellcoding Tips and Tricks, and Return Oriented Programming. From the fundamentals of ARM architecture to crafting powerful shellcode, this course empowers you with practical knowledge to exploit ARM-based IoT devices.

Overview

ARM assembly language is at the forefront of IoT device exploitation, serving as a critical skill for cybersecurity professionals and ethical hackers. Given ARM's prevalence in the architecture of many IoT devices, understanding ARM assembly becomes paramount for those seeking to identify vulnerabilities and secure these interconnected technologies.

Course contents

Meet the instructor

Munnawar Shelia

A seasoned Security Researcher at Payatu, Munnawar Shelia is an expert in identifying security flaws in firmware and embedded devices. His professional expertise encompasses a range of captivating interests, including Reverse Engineering, Malware Analysis, Fuzzing, and Exploit Development. Beyond his corporate responsibilities, Munnawar is a passionate advocate for knowledge-sharing within the cybersecurity community and has delivered training sessions at various cybersecurity conferences.
In his blog taintedbits.com, Munnawar shares his experiences and expertise in malware analysis, Capture The Flag (CTF) challenges, and other security-related topics.
To sum it up, Munnawar Shelia is not just a Security Researcher; he's a digital detective, hacking and writing his way through the cyber maze, leaving no vulnerability unturned.
Patrick Jones - Course author

Stay ahead in the world of ARM-based IoT exploitation

Read what our learners are saying about our courses!
Created with

We use cookies to provide you with an optimal experience and relevant communication. Learn more or accept individual cookies.

Necessary

Necessary cookies (First Party Cookies) are sometimes called "strictly necessary" as without them we cannot provide the functionality that you need to use this website. For example, essential cookies help remember your preferences as you navigate through the online school.

Functional

Functional cookies enable this website to provide enhanced functionality and personalization, by remembering information you have entered and choices you make. These preferences are remembered through the use of persistent cookies, so that you will not have to set them again the next time you visit the website.

Analytics

Analytics cookies track information about visits on our website so that we can measure and improve its performance, as well as optimize our course content. These cookies help us analyze user behavior by tracking the number of visits, how visitors use the website, which site or page they come from and how long they are staying for.

Marketing

Marketing cookies are used to deliver advertising material relevant to you and your interests. They are also used to limit the number of times you see an advertisement, resulting to more targeted advertising, as well as help us measure the effectiveness of our campaigns. They are usually placed by advertising networks we collaborate with, with our permission.