OFFENSIVE ARM EXPLOITATION EXPERT (OAEE)

The Offensive ARM Exploitation Expert (OAEE) Certification sets the stage for you to showcase your unparalleled expertise in ARM architecture exploitation. Tailored for seasoned security professionals and exploit enthusiasts, this certification is the definitive validation of your skills in uncovering and exploiting vulnerabilities within ARM based systems. Beyond theoretical knowledge, OAEE challenges you to apply your expertise in real world scenarios, demonstrating your ability to breach the lack of, or missing security mitigations employed in ARM based systems.

Exam Duration : 24 hours

Acquire Essential Training Before Certification

Offensive Arm64 Reversing And Exploitation​​

This course starts with an introduction to ARM64 instruction set followed by details on how to perform debugging and Reversing Engineering on ARM64 binaries. Students will learn how to use  Ghidra along with the scripting engine. The course covers an introduction to different exploitation categories (UaF, Heap Overflow etc), and follows it up with the various available exploit mitigations on modern Mobile devices (ASLR, PAN, PAC, Stack Canaries etc). The students will also learn how to writing ROP chains for ARM and perform patching on ARM binaries.

Who Should Take This Course?
This course is for security researchers, penetration testers, mobile security engineers, developers or anyone keen to get an introduction to reverse engineering and exploiting ARM64 binaries.

Mobile Training
Corellium

Virtualized Hardware Devices

During the exam, we will be providing you access to Corellium. This sophisticated platform offers an impeccably seamless and dynamic virtual environment, tailored for the execution of practical evaluations on virtualized ARM devices encompassing both iOS and Android ecosystems. With access to Corellium, you will emulate the authentic interaction experienced with physical devices, enabling you to proficiently navigate various introspection tools, scrutinize system and kernel logs, inspect intricate file systems, dissect system calls, and analyze network traffic - all in real time.

As part of the preparatory process, a comprehensive orientation on Corellium's utilization will be provided, accompanied by a pre-configured environment equipped with all requisite custom tools, affording you the opportunity to channel your focus exclusively towards the substantive aspects of the examination.

With you every step of the way

Stand out as a proficient and practical Certified Android Malware Researcher by immersing yourself in real-world labs, mastering technical intricacies, and honing your skills in comprehensive vulnerability research.

Real-World Labs for Practical Mastery

Our certification program offers hands-on labs that mirror real-world scenarios, immersing you in the intricacies of iOS and Android systems. By simulating actual vulnerabilities and attack vectors, you'll gain practical mastery,

Unparalleled Technical Depth


You'll dissect vulnerabilities, understand their underlying mechanics, and learn how to effectively exploit them. This technical depth sets you apart as a true expert in mobile security, capable of unraveling the most intricate security issues.

Comprehensive Vulnerability Research (VR)

Our labs equip you with specialized tools and methodologies to conduct thorough Vulnerability Research (VR) on mobile platforms. You'll navigate the dynamic landscape of mobile security, gaining the skills needed to uncover vulnerabilities and devise effective strategies for mitigation

How does it work ?