Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Writing Bare-Metal ARM Shellcode

Hack In The Box Security Conference via YouTube

Overview

Dive into the intricacies of ARM shellcode development in this comprehensive lab session from the Hack In The Box Security Conference. Explore the critical intersection of Internet of Things (IoT) security and ARM architecture, focusing on the unique challenges and responsibilities in securing these ubiquitous devices. Begin with a foundational overview of ARM architecture and instruction sets before delving into system calling conventions. Apply this knowledge in hands-on exercises, crafting ARM Linux shellcode to spawn a shell. Learn techniques for optimizing shellcode size and reliability, crucial for execution in constrained environments. Witness a live demonstration of exploiting a vulnerable ARM-based IoT device running bare-metal firmware, showcasing the process of leveraging a buffer overflow vulnerability to control GPIO pins. Gain insights into the distinct challenges of writing shellcode for bare-metal systems compared to traditional operating systems. Led by IoT Security Researcher Munawwar Hussain Shelia, this session equips security professionals with essential skills for reversing ARM binaries, identifying vulnerabilities, and developing effective exploits in the rapidly evolving IoT landscape.

Syllabus

#HITBCyberWeek D1 LAB - Writing Bare-Metal ARM Shellcode

Taught by

Hack In The Box Security Conference

Reviews

Start your review of Writing Bare-Metal ARM Shellcode

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.