Torrent details for "Android Userland Fuzzing and Exploitation - BlackHat" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
None
Total Size:
21.3 GB
Info Hash:
EE9549D682D9A3D1F653839ADFC38C08EA6594AA
Added By:
Added:
Sept. 13, 2025, 3:29 p.m.
Stats:
|
(Last updated: Sept. 13, 2025, 3:34 p.m.)
| File | Size |
|---|---|
| Day-1 hide01.ir.mkv | 1.2 GB |
| Day-2 hide01.ir.mkv | 1.6 GB |
| Training-Material-Part1.pdf | 13.0 MB |
| lab-setup-hide01.ir.pdf | 12.6 MB |
| Ubuntu-Emulated-Fuzzing-hide01.ir.ova | 18.4 GB |
Name
DL
Uploader
Size
S/L
Added
NOTE
SOURCE: Android Userland Fuzzing and Exploitation - BlackHat
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
During this course, you will be introduced to the world of Android user-land exploitation techniques used by threat actors. We will start by covering the basics of ARM assembly language and move into reversing the Android Native components to find vulnerabilities. During reverse engineering, we will teach how to find functions that can be harnessed and fuzzed to identify 0-day vulnerabilities. You will learn how to analyse crashes found by your fuzzer and finally learn how to exploit them. We will then move on to Android Userland exploitation and will go over the tools that are needed to build reliable and weaponised exploits. We will dive into bypassing different exploit mitigations like NX and ALSR on Android running on ARM architecture. At the end of the training, you will be able to identify a vulnerability using reverse engineering & fuzzing and write a complete exploit chain bypassing the latest mitigations
×


