Search results for #ExploitLab
🙌🏼way to go! This makes four 0 days and CVEs and from ARM #Exploitlab students! Congratulations!
🙌🏼way to go! This makes four 0 days and CVEs and from ARM #Exploitlab students! Congratulations!
This, and a lot more in the updated #ARM #IoT #ExploitLab class at #Ringzer0 - ringzer0.training/arm-iot-exploi…
I shall be teaching the ARM IoT #ExploitLab at #HITB2019AMS in May. 3 days of Arm shellcoding, ROP chaining, firmware emulation and attacking hardware targets...followed by the 10th anniversary of one of my fav conferences! RTs appreciated. cc @l33tdawg conference.hitb.org/hitbsecconf201…
Valentine’s #ExploitLab fashion at #offensivecon19. Training day 4 - hacking ARM IoT in style Cc @barbieauglend @Ko97551819 @LukasHermannBFS @offensive_con
Excited to try out ropper’s semantic mode in my next ARM #Exploitlab cc @s4sh_s
Excited to try out ropper’s semantic mode in my next ARM #Exploitlab cc @s4sh_s
My umpteenth Hack In The Box, but my first @HITBGSEC! Excited to teach the 3 day ARM IoT #ExploitLab in Singapore. Looking forward to friends old and new. gsec.hitb.org/sg2018/session…
Great class #ARM #IoT class @therealsaumil #ExploitLab -- A1 class for anyone making the transition from MIPS/x86/whatever IoT asm exploitation to ARM. #blackhat #blackhat
Honoured to be teaching the ARM #ExploitLab at @ThinkstCanary’s offices in beautiful Cape Town. @haroonmeer @marcoslaviero and crew are amongst the sharpest I’ve met. It’ll be 4 days of intense ARM wrestling in these digs!
And it’s a wrap! #ARM #Exploitlab at #HITB2018AMS. Root shells on routers and ipcams. Props to the awesome students and volunteers! See you next @HITBSecConf!
Guest appearance by @sgniwx discussing firmware extraction for IoT devices in the #ARM #ExploitLab at #HITB2018AMS!
#CanSecWest 2018 #ARM #ExploitLab updates ✅ New course description posted ✅ Added 3 new hardware targets - routers and ipcams ✅ New shellcode and ARM ROP And the best update: ✅ @Fox0x01 joins me as a co-instructor! Register at cansecwest.com/dojos/2018/exp… cc @dragosr @secwest
