Exploiting ARM-based IoT Devices

Uncover the secrets of ARM Assembly Prime, delve into Stack Base Buffer Overflow, master Shellcoding Tips and Tricks, and grasp the intricacies of Return Oriented Programming.

What's in the Course?

  • Introduction to ARM
  • Intro to Memory corruption Vulnerabilities
  • Some tips on crafting ARM Shellcode
  • Introduction to Return Oriented Programming
  • Ability to write ARM assembly
  • Exploit basic vulnerabilities

What you will Learn

Dive deep into ARM Assembly Prime, Stack Base Buffer Overflow, Shellcoding Tips and Tricks, and Return Oriented Programming. From the fundamentals of ARM architecture to crafting powerful shellcode, this course empowers you with practical knowledge to exploit ARM-based IoT devices.

Overview

ARM assembly language is at the forefront of IoT device exploitation, serving as a critical skill for cybersecurity professionals and ethical hackers. Given ARM's prevalence in the architecture of many IoT devices, understanding ARM assembly becomes paramount for those seeking to identify vulnerabilities and secure these interconnected technologies.

Course contents

Meet the instructor

Munnawar Shelia

A seasoned Security Researcher at Payatu, Munnawar Shelia is an expert in identifying security flaws in firmware and embedded devices. His professional expertise encompasses a range of captivating interests, including Reverse Engineering, Malware Analysis, Fuzzing, and Exploit Development. Beyond his corporate responsibilities, Munnawar is a passionate advocate for knowledge-sharing within the cybersecurity community and has delivered training sessions at various cybersecurity conferences.
In his blog taintedbits.com, Munnawar shares his experiences and expertise in malware analysis, Capture The Flag (CTF) challenges, and other security-related topics.
To sum it up, Munnawar Shelia is not just a Security Researcher; he's a digital detective, hacking and writing his way through the cyber maze, leaving no vulnerability unturned.
Patrick Jones - Course author

Stay ahead in the world of ARM-based IoT exploitation

Created with