Description
Size: 21.2 GB
$20.00
During this course, you will be introduced to the world of Android user-land exploitation techniques used by threat actors. We will start by covering the basics of ARM assembly language and move into reversing the Android Native components to find vulnerabilities. During reverse engineering, we will teach how to find functions that can be harnessed and fuzzed to identify 0-day vulnerabilities. You will learn how to analyze crashes found by your fuzzer and finally learn how to exploit them. We will then move on to Android Userland exploitation and will go over the tools that are needed to build reliable and weaponized exploits. We will dive into bypassing different exploit mitigations like NX and ALSR on Android running on ARM architecture. At the end of the training, you will be able to identify a vulnerability using reverse engineering & fuzzing and write a complete exploit chain bypassing the latest mitigations.
Size: 21.2 GB