The Definite Guide to ARM Exploitation

The Definite Guide to ARM Exploitation

$419.00
{{option.name}}: {{selected_options[option.position]}}
{{value_obj.value}}

ARM is one of the most popular processor architecture in today's world. Be it IoT Devices, Healthcare appliances or your smartphone, ARM is everywhere. Being able to identify vulnerabilities in ARM binaries and perform exploitation, is one of the most required skillsets for any penetration tester.  The Definite Guide to ARM Exploitation is an adventurous journey into the world of ARM architecture, reversing binaries, identifying vulnerabilities and learning how to perform exploitation. The book takes advantage of emulated ARM architecture, which means that you don't need to buy expensive hardware or tools to try out the exercises and labs in the book. With the book, you will find yourself tearing apart ARM binaries and exploiting them using techniques such as overflow-based exploitation and ROP.  If you have never looked at ARM binaries before and want to get started, this is a must-have book. In this multi-part book series, author Barun Kumar Basak takes you step-by-step into learning

Show More Show Less