Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

CyberSecurity Summary

Beginner's Guide to Exploitation on ARM Vol 2

24 Apr 2025

Description

The Book, titled "Beginner's Guide to Exploitation on ARM Vol 2," is a guide to learning about exploiting security vulnerabilities in ARM-based systems. It is a continuation of the previous volume and starts with an introduction that emphasizes building upon prior knowledge. The document then explores various vulnerability types like integer overflows, one-byte overflows, double-free() conditions, and stack pivoting techniques. It provides practical examples of these vulnerabilities, showing how they can be exploited in real-world applications. The document also discusses stack canaries, a common mitigation used to prevent stack buffer overflows. Finally, the document examines heap feng shui, a technique used to manipulate heap layout and exploit vulnerabilities in a controlled manner.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summaryDiscover our free courses in tech and cybersecurity, Start learning today:https://linktr.ee/cybercode_academy

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.