Wow, this last month has been pretty intense. Between trips, new articles and projects I haven’t had much free time (although I enjoyed this month).
Exploiting Arm Linux Systems
This was my first article dealing specifically with ARM processors (even though I had already played with ARM-based embedded things…)
You can find the article at this address: http://www.exploit-db.com/download_pdf/16151
The majority of ARM systems are vulnerable and not adequately protected against arbitrary code execution attacks. I’ve (tried to) brought together, in a single document, the knowledge required to approach the exploitation of ARM Linux systems.
I assure you the article will not be a heavy read, because the chapters are full of examples, images and graphics.
A small digression: a friend of mine, has proposed me a t-shirt design. To appreciate the idea, one must have a basic knowledge of the ARM architecture:
(Or maybe are these words a veiled reproach? )