applied security conferences and training: CanSecWest | PacSec | EUSecWest |

Security Masters Dojo

Advanced and intermediate security training and technology enhancement for information security professionals.

CanSecWest: Security Masters Dojo Vancouver


The ARM IoT Exploit Lab
Register for the March 10-13, 4-day course

Instructor(s):
Lead instructor: Saumil Shah
Co-instructor: Maria "Azeria" Markst

Description

"There's an Intel on every desktop, but an ARM in every pocket."

The Internet of Things (IoT) universe comprises largely of ARM based systems. The ARM IoT Exploit Laboratory for 2018 brings you an intense 4-day course featuring a practical hands-on approach to exploit development on ARM based systems. This class is perfectly suited for students who are keen to dive into the world of modern ARM exploit development.

Our intermediate level class begins with an introduction to ARM architecture and ARM assembly language and moves quickly onto debugging techniques for ARM systems, exploiting buffer overflows on ARM devices running Linux, writing ARM shellcode from the ground up, and bypassing exploit mitigation techniques with ARM Return Oriented Programming (ROP). Our lab environment features both hardware and virtual machine targets.

The class concludes with an end-to-end "Firmware-To-Shell" hack, testing out ARM exploitation skills against commercial ARM based SoHo routers and IP Cameras. Students will extract the manufacturer's firmware, learn how to analyse and debug them in virtual environments, build exploits involving tight ROP chaining and ASLR bypass, and finally succeed in getting shells on the actual hardware.

As with the popular Exploit Laboratory, all topics are delivered in a down-to-earth, learn-by-example methodology. The same trainers who brought you The Exploit Laboratory for over 12 years have been working hard in putting together an all new class based on past feedback!

PREREQUISITE WARNING Each class has prerequisites for software loads and a laptop is mandatory. These individual class guides will list material the students are expected have knowledge about coming in and software tools that need to be pre-installed before attending so you get the maximum benefit from the focused intermediate or advanced level course. Please pay particular attention to the prerequisites, as the material listed there will not be reviewed in the courses, and will be necessary to get the maximum benefit out of these educational programs.

Learning Objectives

Students will be provided with all the lab images used in the class. The ARM IoT Exploit Laboratory uses a "Live Notes" system that provides a running transcript of the instructor's system to all the students. Our lab environment, plus about 700MB of curated reading material, will be made available to all attendees to take with them and continue learning after the training ends.

TARGET AUDIENCE

PREREQUISITES

Course Outline


DAY 1 DAY 2 DAY 3 DAY 4

REQUIREMENTS

The following tutorials have been specially prepared to get students up to speed on essential concepts before coming to class.

a) Operating Systems - A Primer

b) How Functions Work

c) Introduction to Debuggers

If you have the time and want to get a bit of a head start on ARM Basics, I highly recommend Azeria's ARM Basics Tutorials - especially the following:

https://azeria-labs.com/writing-arm-assembly-part-1/
https://azeria-labs.com/assembly-basics-cheatsheet/
https://azeria-labs.com/process-memory-and-memory-corruption/

HARDWARE REQUIREMENTS:

SOFTWARE REQUIREMENTS:

THE EXPLOIT LAB BLOG: http://blog.exploitlab.net
OUR TWITTER STREAM: @exploitlab