ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

DEFCON 18: Exploitation on ARM: Technique and Bypassing Defense Mechanisms 2/3

Автор: Christiaan008

Загружено: 2010-10-05

Просмотров: 574

Описание: Speaker: Itzhak Avraham (zuk)

In this presentation there will be covered (from scratch) quick talk on security mechanisms on X86 and how to bypass them, how exploits are being used on X86 and why they won't work as is on ARM, How to approach ARM assembly from hacker point of view and how to write exploits in the proper way for a remote and local attacker on ARM, what are the options for ARM hacker, etc.

This presentation starts from the very basics of ARM assembly (since there are not lots of expert on this subject) and advance to an expert level of ARM. After this talk you'll think in ARM way. Today, ARM is running on almost everything (mobile phones, TVs, or tons of other devices). Till now, we were used to think that ARM means no protection mechanisms, which is not the case with the next generation mobile phones.

In the recent/upcoming mobile phones you can start seeing security mechanisms implied. How can you run your shellcode if your stack is not executable? What else do you need to know?

There's almost nothing known on how to exploit weaknesses over ARM in the assembly level, when there are security mechanisms which are very common in X86.

This presentation also presents a technique to create a shellcode which will be able to pass security mechanisms over ARM. For example, this technique can be used to exploit a stack-overflow on ARM when stack is not executable.

For presentations, whitepapers or audio version of the Defcon 18 presentations visit: http://defcon.org/html/links/dc-archi...

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
DEFCON 18: Exploitation on ARM: Technique and Bypassing Defense Mechanisms 2/3

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

DEFCON 18: Exploitation on ARM: Technique and Bypassing Defense Mechanisms 3/3

DEFCON 18: Exploitation on ARM: Technique and Bypassing Defense Mechanisms 3/3

DEFCON 18: You Spent All That Money and You Still Got Owned 3/3

DEFCON 18: You Spent All That Money and You Still Got Owned 3/3

DEFCON 18: A New Approach to Forensic Methodology Case Studies 1/4

DEFCON 18: A New Approach to Forensic Methodology Case Studies 1/4

OHM2013: How to rule the Internet (together with everybody else)

OHM2013: How to rule the Internet (together with everybody else)

OHM2013: Real time network forensics using pom-ng

OHM2013: Real time network forensics using pom-ng

Mirra Andreeva vs. Katerina Siniakova | 2026 Indian Wells Round 3 | WTA Match Highlights

Mirra Andreeva vs. Katerina Siniakova | 2026 Indian Wells Round 3 | WTA Match Highlights

W środku bomby atomowej dzieje się piekło || Paweł Janowski - didaskalia#179

W środku bomby atomowej dzieje się piekło || Paweł Janowski - didaskalia#179

OHM2013: Solar Powered Autonomous Routers

OHM2013: Solar Powered Autonomous Routers

Maria Sakkari vs. Iga Swiatek | 2026 Indian Wells Round 3 | WTA Match Highlights

Maria Sakkari vs. Iga Swiatek | 2026 Indian Wells Round 3 | WTA Match Highlights

ESKA Hity na Czasie 🎧 Marzec 2026 – oficjalny mix Radia ESKA #4

ESKA Hity na Czasie 🎧 Marzec 2026 – oficjalny mix Radia ESKA #4

OHM2013: Kimiko Ishizaka plays Bach and Chopin

OHM2013: Kimiko Ishizaka plays Bach and Chopin

GPT 5.4 — ИИ Достиг Уровня Человека? ИИ НОВОСТИ

GPT 5.4 — ИИ Достиг Уровня Человека? ИИ НОВОСТИ

Koniec z okularami? To jedno nasionko odbudowuje siatkówkę od wewnątrz

Koniec z okularami? To jedno nasionko odbudowuje siatkówkę od wewnątrz

Werewolf VFLEX Review: Power Almost Anything Through USB-C!

Werewolf VFLEX Review: Power Almost Anything Through USB-C!

IGA ŚWIĄTEK WYGRYWA Z MARIĄ SAKKARI I MELDUJE SIĘ W 1/8 FINAŁU! SAKKARI - ŚWIĄTEK, SKRÓT MECZU

IGA ŚWIĄTEK WYGRYWA Z MARIĄ SAKKARI I MELDUJE SIĘ W 1/8 FINAŁU! SAKKARI - ŚWIĄTEK, SKRÓT MECZU

OHM2013: Reverse Engineering of VMFS

OHM2013: Reverse Engineering of VMFS

OHM2013: Elphel Open Hardware and Free Software Reconfigurable Network Cameras

OHM2013: Elphel Open Hardware and Free Software Reconfigurable Network Cameras

Новости ИИ — новые модели от Google и OpenAI, драма вокруг ИИ и человекоподобные роботы на заводах.

Новости ИИ — новые модели от Google и OpenAI, драма вокруг ИИ и человекоподобные роботы на заводах.

Новые обновления Claude уничтожают OpenClaw!

Новые обновления Claude уничтожают OpenClaw!

Remote hack on Damn Vulnerable Linux (credits EXALT)

Remote hack on Damn Vulnerable Linux (credits EXALT)

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]