ARM REVERSE ENGINEERING ON 32-BIT AND 64-BIT

Price:

From €990

Date:

Duration:

4 days

Level:

Medium

Image-empty-state.png

Trainer

Maria Markstedter

Maria Markstedter is the CEO and founder of Azeria Labs, established in 2017 to provide advanced training to companies on binary exploitation, as well as identifying and defending security vulnerabilities on Arm devices. Azeria Labs also provides free public workshops that teach developers and security engineers about the security of Arm-based technologies.

In 2018, Maria was listed in Forbes 30 Under 30 and joined the review board of the Black Hat security conference.

Maria's research interests are in processor and OS security, defensive mitigations against binary exploits, and reverse engineering.

About the training

Packed with practical labs and hands-on examples, our AMR Reverse Engineering course is designed to give students a deep understanding of Arm 32-bit and Arm 64-bit assembly, and to perform both static and dynamic analysis of compiled programs.

Our reverse engineering courses are based around a series of reverse engineering labs, ranging from pure reverse engineering of compiled binaries to offensive security-focused vulnerability discovery and vulnerability class hunting.

Key takeaways

• Disassemble and debug real-world applications
• Perform vulnerability discovery and learn about different vulnerability classes
• Understand control flow of real-world applications
• Learn to use disassembly tools like Ghidra, radare2, Frida, and GDB

Level: Medium
Duration: 4 days
Prerequisites: RE concepts