64-Bit Arm Assembly Foundation Course For Ethical Hackers - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: 64-Bit Arm Assembly Foundation Course For Ethical Hackers (/Thread-64-Bit-Arm-Assembly-Foundation-Course-For-Ethical-Hackers) |
64-Bit Arm Assembly Foundation Course For Ethical Hackers - AD-TEAM - 12-20-2024 64-Bit Arm Assembly Foundation Course For Ethical Hackers Published 12/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 11.58 GB | Duration: 23h 14m Master ARM 64-bit Assembly for Ethical Hacking: Write, Analyze ARM assembly Code for Enhanced Cybersecurity Skills What you'll learn Understanding ARM Architecture: Introduction to ARM architecture and its significance in modern computing and cybersecurity. Installing and configuring tools needed for ARM 64-bit assembly programming, such as assemblers, debuggers, and emulators. Basic Assembly Syntax: Writing simple ARM 64-bit assembly programs and understanding the syntax and structure of assembly language. Detailed overview of the ARM 64-bit instruction set, including data processing instructions, control flow instructions, and memory access i Registers and Data Types: Understanding ARM 64-bit registers, data types, and their usage in assembly programming. Understanding Memory Layout: Learning about memory segments (text, data, stack, and heap) and their roles in program execution. Addressing Modes: Exploring different addressing modes in ARM 64-bit assembly and how they are used to access memory. Function Calls and Stack Management: Writing and calling functions, managing the stack, and understanding calling conventions. Conditional Execution and Looping Constructs: Implementing conditional statements and loops in assembly language. Requirements Linux command line basics C programming basics. A keen interest in ethical hacking, cyber security, or reverse engineering. Description Unlock the power of ARM 64-bit assembly programming with our comprehensive course tailored for ethical hackers and cyber security professionals. In today's tech landscape, ARM architecture is ubiquitous in mobile devices, IoT, and embedded systems. This course is designed to provide you with the essential skills to write, analyze, and reverse engineer ARM 64-bit assembly code, elevating your expertise in cyber security.What You'll Learn:ARM Architecture Fundamentals: Understand the ARM 64-bit architecture, instruction sets, and how they differ from other processors.Assembly Language Basics: Master the basics of ARM 64-bit assembly syntax, data types, and registers.Memory Management: Learn about memory layout, addressing modes, and effective memory management techniques.Advanced Programming Techniques: Implement advanced assembly language constructs, including function calls, stack management, and conditional execution.Practical Ethical Hacking Applications: Apply your knowledge to real-world scenarios. Reverse engineer ARM-based binaries, develop exploits, and write shellcode.Security Research and Malware Analysis: Gain insights into analyzing ARM-based malware and conducting vulnerability assessments.Why This Course?This course offers you a hands-on approach with practical exercises, real-world examples to ensure you can apply what you learn directly to your cyber security work. Join now to master ARM 64-bit assembly and enhance your ethical hacking skills!Enroll today and take the first step towards becoming an expert in ARM 64-bit assembly and ethical hacking. Overview Section 1: Introduction Lecture 1 Introduction Lecture 2 Why should we learn ARM assembly language ? Section 2: Building the foundation for ARM assembly programming Lecture 3 How a computer system works ? Lecture 4 How does an ARM CPU works internally ? Lecture 5 ARM CPU registers and its workings Lecture 6 PSTATE register ( flag register ) working in ARM CPU. Lecture 7 Memory layout of a Linux program Section 3: Lab machine configuration Lecture 8 Lab machine setup for arm assembly programming Section 4: Hello World in ARM assembly Lecture 9 Basic ARM assembly program structure Lecture 10 Concept of system calls in Linux Operating system Lecture 11 Printing "Hello World" in ARM assembly programming Lecture 12 Debugging "Hello World" ARM assembly program in GDB Section 5: Loading data into registers from memory in ARM assembly programming Lecture 13 How to define data in ARM assembly programming ? Lecture 14 How to examine our ARM binary program data dynamically in GDB Lecture 15 How to load the data from memory into ARM CPU registers using load instruction Lecture 16 Loading a single byte data from an array using register relative addressing Lecture 17 Loading a word (4 byte ) data from an array using register relative addressing Lecture 18 Loading 8 byte sized data from an array using register relative addressing Lecture 19 Loading the data using Pre-index register relative addressing method Lecture 20 Loading the data using Post-index register relative addressing method Lecture 21 Loading the data using base indexed memory addressing Lecture 22 Loading page address into registers in arm assembly programming Lecture 23 Loading the data in pairs in registers in arm assembly programming Section 6: Storing the data from register into memory in arm assembly programming Lecture 24 Storing our data from register into memory using store ( str ) instruction Lecture 25 Storing data from the register into an array in memory Lecture 26 Storing data from register using pre-indexed register relative addressing Lecture 27 Storing data from register using post-indexed register relative addressing Lecture 28 Storing the data in pairs from register to memory Section 7: Branching in arm assembly programming Lecture 29 Loading a label memory address into register Lecture 30 How to use branch instruction in arm assembly programming Lecture 31 Jumping to memory location using a register in branch instruction in assembly Lecture 32 Using branch and link instruction to call a function in arm assembly programming Lecture 33 Using a condition in branch instruction in arm assembly programming Section 8: Bit shifting operations in arm assembly programming Lecture 34 Shifting bits in left and right direction in arm assembly programming Lecture 35 How negative numbers are converted in binary Lecture 36 Moving bits using mov and lsl instruction in arm assembly programming Lecture 37 Using asr instruction to shift right in arm assembly programming Lecture 38 Rotating the bits in the right direction in arm assembly programming Lecture 39 BitField move instruction to move bits into register in arm assembly programming Section 9: Arithmetic Operations in arm assembly programming Lecture 40 Adding numbers in arm assembly programming Lecture 41 Subtraction of numbers in arm assembly programming Lecture 42 Addition with status in arm assembly programming Lecture 43 How subtraction works in binary ? Lecture 44 Subtraction with status in arm assembly programming Lecture 45 Multiplication in arm assembly programming Lecture 46 Multiply with add and subtract in arm assembly Lecture 47 Multiply and negate operation Lecture 48 Dividing numbers in arm assembly programming Section 10: Logical operations in arm assembly programming Lecture 49 AND logical operation in arm assembly programming Lecture 50 OR logical operation in arm assembly programming Lecture 51 XOR logical operation in arm assembly programming Lecture 52 NOT operation in arm assembly programming Lecture 53 Comparing two values in arm assembly programming Section 11: Functions in arm assembly Lecture 54 How to use functions in arm assembly programming Lecture 55 How a program knows where to return after function call Lecture 56 How functions works with the stack memory Lecture 57 How stack frame is created on stack for functions in arm assembly ? Lecture 58 Creating a stack frame for a function in arm assembly programming Lecture 59 An example of stack frame creation in arm assembly Lecture 60 Effect of normal indexed addressing on stack memory Lecture 61 Effect of pre-indexed addressing on stack memory Lecture 62 Effect of normal- indexed addressing of ldp instruction on stack memory Lecture 63 Effect of post-indexed addressing of ldp instruction on stack memory Section 12: Basics of Reverse Engineering in arm binary Lecture 64 Reverse Engineering Basics Lecture 65 Performing static analysis of Hello World ARM binary Lecture 66 Understanding code construct of Hello World program Lecture 67 Performing dynamic analysis of Hello World arm binary Lecture 68 Tracing the main function arguments in arm binary using dynamic analysis Lecture 69 Understanding how the function variables are used with registers & memory Lecture 70 Tracing the function arguments in disassembly Ethical Hackers and Penetration Testers,Cybersecurity Professionals,Reverse Engineers and Malware Analysts,Computer Science Students and Enthusiasts,Software Developers and Engineers,IoT Developers,Hobbyist Hackers and Tinkerers,Security Researchers |