Training Details
What Will Students Learn
ARM is at the heart of most mobile devices, and with the introduction of Apple’s M1 chip and ARM on Cloud servers, its use has become even more prevalent. Whether you’re running apps on your phone or the world’s fastest supercomputer, you’re most likely running ARM. For security researchers, it becomes important to learn about the ARM architecture and it’s instruction set which can assist in reverse engineering and exploit development.
In this course, we will start with the ARM instruction set and learn about some of the most important instructions and registers. We will look at some of the security mitigations that are present in the latest instruction sets, and its adaptance is real world devices. We will look at some of the different exploitation categories (Heap Overflow, Use-after-free, Uninitialized stack variable etc) , followed by a quick intro to reverse engineering. We will then look at reverse engineering some simple binaries and finally we will spend the rest of the course writing exploits.
Please share with us the project requirements and the goals you want to achieve, and one of our sales representatives will contact you within one business day.
51 Pleasant St # 843, Malden, MA, Middlesex, US, 02148
contact@8ksec.io
trainings@8ksec.io
press@8ksec.io
+1(347)-4772-006
Get the latest news & updates
© 2024 8kSec LLC All Right Reserved