Description
Reverse engineering and exploit development in ARM published by Udemy Academy. An Introduction to Weapons Operations, Part One.
Welcome to the first and cheapest tapping course on Udemy. This course is for beginners only. As you all know, arm-based devices are becoming more and more common these days, so it is important to learn how to secure them. I have done this course a lot. This is practical so you don’t get tired while walking. This course only requires a PC, we don’t need a Raspberry Pi or anything else, we use simulated labs. This course is very basic and if you are already familiar with buffer. Format string overflows and exploits, this won’t help you much, but it can still help as an introduction and as an introduction to ARM exploits.
This course focuses on Arm v6 (32-bit) vulnerabilities and exploitation. We start with basic arm instructions and move on to practical operations. The main parts of this course are reverse engineering and binary exploitation. We will reverse and correct. Behavior of simple crack programs using Ghidra, Binary Ninja, Hopper, etc. We then move on to exploit various binaries using thread and buffer overflow vulnerabilities. After that, we’ll look at the protections binaries use and how to get around them. Use more CTF style examples. Since this is the first part of the course, we will cover everything from the beginning. This course has a 30-day refund policy, so even if you don’t like the course, you can definitely get your money back 100%.
What you will learn in the Reverse Engineering and Exploit Development in ARM course:
- Exploitation of weapons
- Binary exploitation
- Reverse engineering
- Basic Arm Instructions
- gdb primer
- patch binaries
- Ghidra, Binary Ninja, Hopper, etc.
- Development of the operation
- And…
Who should attend :
- Anyone interested in learning binary mining
- the Pirates
- CTF players
- Reverse engineering
Course Specifications
- Editor: Udemy
- Instructor: Ajin Deepak
- French language
- Training level: Introductory to Advanced
- Number of courses: 61
- Training duration: 10 hours and 7 minutes
course topics
Course prerequisites
A PC
Basic programming concept (not necessary)
some interest
Pictures
Introductory video to reverse engineering and exploit development in ARM
installation guide
After the clip, watch with your favorite reader.
english subtitles
Quality: 720p
Download link
password file(s): free download software
File size
5.64 GB