Exploitation on ARM based Systems

This two day workshop will teach the participants how to exploit vulnerabilities in ARMbased environments on modern Linux systems. At the beginning the ARM Architecture will be introduced, followed by exercises involving the exploitation of classic stack based buffer overflows. Furthermore, the participants will learn about modern defense mechanisms such as W^X and ASLR and possibilities to bypass them.

Who Should Attend this Training?

Penetration Testers and IT Security professionals that want to learn more about the ARM Architecture and low level security in ARM Environments and want to understand the meaning of Stack Cookies, W^X, ROP, ASLR. Basic experience with a scripting language such as Python, Ruby or Perl is recommended.

Requirements

A laptop that is capable to run a Kali VM. At least 4 GB of RAM and 30 GB free disk space.

About the Speakers