About the book

About me

Hello, my name is Ajin Deepak, and I work as a security researcher at 8ksec.io. I hold a bachelor's degree in computer science. Originally from India, I thoroughly enjoy acquiring new knowledge and documenting my learnings in my free time. I possess a profound passion for delving into the intricacies of low-level exploitation and have consistently been fascinated by the challenges I encountered during my learning journey. This book represents a compilation of my ARM Exploitation writeups, which were previously published on medium.com.

You can check out my profile here: https://medium.com/@ad2001

if you have queries please feel free to ping me through my email: ajindeepak0007@gmail.com

You can also connect me on Linkedln: https://www.linkedin.com/in/ajin-ad2001/

About the book

I started my journey of learning software exploitation some time ago. Over the course of several months, I dedicated my time to researching and studying assembly and exploitation techniques. I am elated to now have the opportunity to share my knowledge and experiences with you. My aim is for this book to provide you with valuable information that can enhance your understanding.

Despite the challenges and occasional hardships I encountered along the way, I found the process of learning software exploitation to be both enjoyable and captivating. It has always been my aspiration to write articles and share my insights. As a result, I began crafting articles focused on ARM Exploitation on medium.com.

Later on, I contemplated organizing my writeups into a PDF format. Recommendations from friends, as well as observing the widespread usage of GitBook within the community, led me to explore and ultimately choose GitBook as my platform for writing.

My intention for this book is to make it highly practical and beginner-friendly. I want it to be easily understandable for anyone with a computer science background. It will be a dynamic book, with new content added at the end of each month. I plan to cover additional topics such as heap exploitation, as well as other vulnerabilities like off-by-one byte errors and format string vulnerabilities.

Prerequisites

This book is useful for anyone who wants to start their journey on ARM exploitation. This is a beginner-friendly guide. Even though it's beginner-friendly there are some prerequisites. Anyone interested in software exploitation in ARM can follow this book.

  • A Computer background

  • C Programming

  • Python Programming / Any other scripting language

  • Familiarity with the command line and gdb

  • Interest

About C, You only need to understand the c code. You don't need to code anything. Most of the time I will explain the code details.

But I do recommend getting a novice-level grasp of concepts like debugging and disassembling. You should be familiar with GDB.

You can go through these resources for learning gdb and gef.

http://www.securitytube.net/tags/gnu%20debugger

What you'll learn

  • ARM Basics

  • Buffer overflows

  • Integer overflows

  • Rop chains

  • Heap exploitation

  • ARM64 exploitation and much more.

Thanks

I would like to express my heartfelt gratitude to all of the people who have supported and encouraged me throughout the writing of this book, especially my community @in1tcr3w, and a special shoutout to @Fox0x01 for all the free learning materials that helped hundreds of people like me to learn and to give back to the community.

Thank you for taking the time to read my book and I hope that you will enjoy it. I look forward to hearing your thoughts and feedback.

Support and donation

If you enjoy my content and would like to support my work, you can buy me a coffee! Your contribution will help and motivate me to continue to create more content and make it available to everyone.

Last updated