Skip to content

lightoyou/Workshop-BSidesMunich2018

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 

Repository files navigation

Workshop-ARM BSidesMunich2018

ARM shellcode and exploit development

Workshop topics

ARM Architecture

  • ARM CPU
  • Registers
  • Instructions
  • PC-relative addressing
  • Calling convention and Stack frames

LAB1 - Debugging on ARM system

Shellcode

  • syscalls
  • Shell spawning shellcode (ARM/Thumb) + LAB2
  • Bind TCP shellcode (ARM) + LAB3
  • Reverse shell shellcode (ARM)

Exploit

  • Tools introduction (pwntools, ROPGadget)
  • Modify the value of a local variable (stack1) + LAB4
  • Vulnerability mitigations
  • Ret to libc - Bypass NX and execute a shell with a single ROP gadget (stack_sh) + LAB5
  • Bypass NX with ROP using mprotect (stack_mprotect) + LAB6
  • ASLR
  • Bypassing NX and ASLR (stack_aslr) + LAB7

Enviroment

About

ARM shellcode and exploit development - BSidesMunich 2018

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 48.5%
  • Assembly 42.4%
  • C 9.1%