Register Account


Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
64-Bit Arm Assembly Foundation Course For Ethical Hackers
#1
[Image: 3a9c0797baacbfa99b57d9402822a4a7.jpg]
64-Bit Arm Assembly Foundation Course For Ethical Hackers
Published 12/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 11.58 GB | Duration: 23h 14m

Master ARM 64-bit Assembly for Ethical Hacking: Write, Analyze ARM assembly Code for Enhanced Cybersecurity Skills

What you'll learn

Understanding ARM Architecture: Introduction to ARM architecture and its significance in modern computing and cybersecurity.

Installing and configuring tools needed for ARM 64-bit assembly programming, such as assemblers, debuggers, and emulators.

Basic Assembly Syntax: Writing simple ARM 64-bit assembly programs and understanding the syntax and structure of assembly language.

Detailed overview of the ARM 64-bit instruction set, including data processing instructions, control flow instructions, and memory access i

Registers and Data Types: Understanding ARM 64-bit registers, data types, and their usage in assembly programming.

Understanding Memory Layout: Learning about memory segments (text, data, stack, and heap) and their roles in program execution.

Addressing Modes: Exploring different addressing modes in ARM 64-bit assembly and how they are used to access memory.

Function Calls and Stack Management: Writing and calling functions, managing the stack, and understanding calling conventions.

Conditional Execution and Looping Constructs: Implementing conditional statements and loops in assembly language.

Requirements

Linux command line basics

C programming basics.

A keen interest in ethical hacking, cyber security, or reverse engineering.

Description

Unlock the power of ARM 64-bit assembly programming with our comprehensive course tailored for ethical hackers and cyber security professionals. In today's tech landscape, ARM architecture is ubiquitous in mobile devices, IoT, and embedded systems. This course is designed to provide you with the essential skills to write, analyze, and reverse engineer ARM 64-bit assembly code, elevating your expertise in cyber security.What You'll Learn:ARM Architecture Fundamentals: Understand the ARM 64-bit architecture, instruction sets, and how they differ from other processors.Assembly Language Basics: Master the basics of ARM 64-bit assembly syntax, data types, and registers.Memory Management: Learn about memory layout, addressing modes, and effective memory management techniques.Advanced Programming Techniques: Implement advanced assembly language constructs, including function calls, stack management, and conditional execution.Practical Ethical Hacking Applications: Apply your knowledge to real-world scenarios. Reverse engineer ARM-based binaries, develop exploits, and write shellcode.Security Research and Malware Analysis: Gain insights into analyzing ARM-based malware and conducting vulnerability assessments.Why This Course?This course offers you a hands-on approach with practical exercises, real-world examples to ensure you can apply what you learn directly to your cyber security work. Join now to master ARM 64-bit assembly and enhance your ethical hacking skills!Enroll today and take the first step towards becoming an expert in ARM 64-bit assembly and ethical hacking.

Overview

Section 1: Introduction

Lecture 1 Introduction

Lecture 2 Why should we learn ARM assembly language ?

Section 2: Building the foundation for ARM assembly programming

Lecture 3 How a computer system works ?

Lecture 4 How does an ARM CPU works internally ?

Lecture 5 ARM CPU registers and its workings

Lecture 6 PSTATE register ( flag register ) working in ARM CPU.

Lecture 7 Memory layout of a Linux program

Section 3: Lab machine configuration

Lecture 8 Lab machine setup for arm assembly programming

Section 4: Hello World in ARM assembly

Lecture 9 Basic ARM assembly program structure

Lecture 10 Concept of system calls in Linux Operating system

Lecture 11 Printing "Hello World" in ARM assembly programming

Lecture 12 Debugging "Hello World" ARM assembly program in GDB

Section 5: Loading data into registers from memory in ARM assembly programming

Lecture 13 How to define data in ARM assembly programming ?

Lecture 14 How to examine our ARM binary program data dynamically in GDB

Lecture 15 How to load the data from memory into ARM CPU registers using load instruction

Lecture 16 Loading a single byte data from an array using register relative addressing

Lecture 17 Loading a word (4 byte ) data from an array using register relative addressing

Lecture 18 Loading 8 byte sized data from an array using register relative addressing

Lecture 19 Loading the data using Pre-index register relative addressing method

Lecture 20 Loading the data using Post-index register relative addressing method

Lecture 21 Loading the data using base indexed memory addressing

Lecture 22 Loading page address into registers in arm assembly programming

Lecture 23 Loading the data in pairs in registers in arm assembly programming

Section 6: Storing the data from register into memory in arm assembly programming

Lecture 24 Storing our data from register into memory using store ( str ) instruction

Lecture 25 Storing data from the register into an array in memory

Lecture 26 Storing data from register using pre-indexed register relative addressing

Lecture 27 Storing data from register using post-indexed register relative addressing

Lecture 28 Storing the data in pairs from register to memory

Section 7: Branching in arm assembly programming

Lecture 29 Loading a label memory address into register

Lecture 30 How to use branch instruction in arm assembly programming

Lecture 31 Jumping to memory location using a register in branch instruction in assembly

Lecture 32 Using branch and link instruction to call a function in arm assembly programming

Lecture 33 Using a condition in branch instruction in arm assembly programming

Section 8: Bit shifting operations in arm assembly programming

Lecture 34 Shifting bits in left and right direction in arm assembly programming

Lecture 35 How negative numbers are converted in binary

Lecture 36 Moving bits using mov and lsl instruction in arm assembly programming

Lecture 37 Using asr instruction to shift right in arm assembly programming

Lecture 38 Rotating the bits in the right direction in arm assembly programming

Lecture 39 BitField move instruction to move bits into register in arm assembly programming

Section 9: Arithmetic Operations in arm assembly programming

Lecture 40 Adding numbers in arm assembly programming

Lecture 41 Subtraction of numbers in arm assembly programming

Lecture 42 Addition with status in arm assembly programming

Lecture 43 How subtraction works in binary ?

Lecture 44 Subtraction with status in arm assembly programming

Lecture 45 Multiplication in arm assembly programming

Lecture 46 Multiply with add and subtract in arm assembly

Lecture 47 Multiply and negate operation

Lecture 48 Dividing numbers in arm assembly programming

Section 10: Logical operations in arm assembly programming

Lecture 49 AND logical operation in arm assembly programming

Lecture 50 OR logical operation in arm assembly programming

Lecture 51 XOR logical operation in arm assembly programming

Lecture 52 NOT operation in arm assembly programming

Lecture 53 Comparing two values in arm assembly programming

Section 11: Functions in arm assembly

Lecture 54 How to use functions in arm assembly programming

Lecture 55 How a program knows where to return after function call

Lecture 56 How functions works with the stack memory

Lecture 57 How stack frame is created on stack for functions in arm assembly ?

Lecture 58 Creating a stack frame for a function in arm assembly programming

Lecture 59 An example of stack frame creation in arm assembly

Lecture 60 Effect of normal indexed addressing on stack memory

Lecture 61 Effect of pre-indexed addressing on stack memory

Lecture 62 Effect of normal- indexed addressing of ldp instruction on stack memory

Lecture 63 Effect of post-indexed addressing of ldp instruction on stack memory

Section 12: Basics of Reverse Engineering in arm binary

Lecture 64 Reverse Engineering Basics

Lecture 65 Performing static analysis of Hello World ARM binary

Lecture 66 Understanding code construct of Hello World program

Lecture 67 Performing dynamic analysis of Hello World arm binary

Lecture 68 Tracing the main function arguments in arm binary using dynamic analysis

Lecture 69 Understanding how the function variables are used with registers & memory

Lecture 70 Tracing the function arguments in disassembly

Ethical Hackers and Penetration Testers,Cybersecurity Professionals,Reverse Engineers and Malware Analysts,Computer Science Students and Enthusiasts,Software Developers and Engineers,IoT Developers,Hobbyist Hackers and Tinkerers,Security Researchers

[Image: Wm7ptg54_o.jpg]

[To see links please register or login]

[To see links please register or login]

[To see links please register or login]

[Image: signature.png]
Reply



Forum Jump:


Users browsing this thread:
2 Guest(s)

Download Now   Download Now
Download Now   Download Now