The description
Reverse Engineering and Developing Exploits in ARM published by Udemy Academy. An introduction to the exploitation of weapons, part one.
Welcome to the cheapest and first arm tapping course on Udemy. This course is for beginners only. As you all know, arm-based devices are becoming more and more important these days, so it is important to learn how to secure them. I did this course a lot. It’s convenient so you don’t get tired while walking. This course only requires a PC, we don’t need a Raspberry Pi or anything else, we use mock labs. This course is very basic and if you are already familiar with stamping. Formatting string overflows and exploits won’t help you much, but it can still help as an introduction and as an introduction to ARM exploits.
This course focuses on Arm v6 (32-bit) vulnerabilities and exploitation. We start with the basic arm instructions and move on to hands-on operation. The main parts of this course are reverse engineering and binary mining. We will reverse and correct. Behavior of simple crack programs using Ghidra, Binary Ninja, Hopper, etc. We then move on to exploiting various binaries using threading and buffer overflow vulnerabilities. After that, we will see the protections used by the binaries and how to bypass them. Use more ctf style examples. As this is the first part of the course, we will cover everything from the beginning. This course has a 30-day money back policy, so even if you don’t like the course, you can definitely get your money back 100%.
What you will learn in the Reverse Engineering and Exploit Development in ARM course:
- Exploitation of the arms
- Binary exploitation
- Reverse engineering
- Basic Arm Instructions
- Primer Gdb
- Binary fixes
- Ghidra, Binary Ninja, Hopper, etc.
- Business development
- And …
Who should attend :
- Anyone interested in learning binary mining
- The Pirates
- FCT Players
- Reverse Engineers
Course specifications
- Editor: Udemy
- Instructor: Ajin Deepak
- French language
- Level of training: Initiation to Advanced
- Number of courses: 61
- Duration of the training: 10 hours and 7 minutes
Course topics
Course prerequisites
a computer
Basic programming concept (not required)
some interest
Pictures
Reverse engineering and developing exploits in the ARM introductory video
Installation guide
After ripping, watch with your favorite player.
english subtitle
Quality: 720p
Download link
password file(s): ngaur.com
File size
5.64 GB