Loading…
BSides Austin 2020 has ended
Thursday, December 10 • 11:00am - 12:00pm
Binary exploitation of 64-bit ARM devices

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Feedback form is now closed.
We will demonstrate the latest techniques for binary exploitation of 64-bit ARM devices which are used for mobile devices and IOT hardware, including disabling or bypassing DEP (Data Execution Protection), bypassing ARLR (Address Space Layout Randomization), bypassing NX (non-executable stack protection), using ROP (Return Oriented Programming) techniques. We will be running actual assembler code (machine language) instructions verses emulated ARM devices as well as using the Python pwntools package. We will also cover some of the differences between (AMD/Intel)X86_64 and ARM64 when writing in Assembler. By understanding these techniques we can better secure mobile and IOT from those who are using these techniques in the wild for evil, as well as understand how to pen test our own solutions and devices to harden them or ensure when they fail, they fail "closed".


Thursday December 10, 2020 11:00am - 12:00pm PST
Balcones

Attendees (1)