DVAR is an emulated Linux based ARM router running a vulnerable web server that you can sharpen your ARM stack overflow skills with.
DVAR runs in the tinysploitARM VMWare VM under a fully emulated QEMU ARM router image.
Simply extract the ZIP file and launch the VM via tinysploitARM.vmx. After starting up, the VM's IP address and default URL shall be displayed on the console. Using your host computer's browser, navigate to the URL and follow the instructions and clues. The virtual network adapter is set to NAT mode.
Your goal is to write a working stack overflow exploit for the web server running on the DVAR tinysploitARM target.
DVAR started as an optional preparatory exercise for the ARM IoT Exploit Lab.
RECON Brussels 2018 (4 day) January 29-Feb 1 https://recon.cx/2018/brussels/training/trainingexploitlab.html
Offensivecon Berlin 2018 (4 day) February 12-15 https://www.offensivecon.org/trainings/2018/the-arm-iot-exploit-laboratory-saumil-shah.html
Cansecwest Vancouver 2018 (4 day) March 10-13 https://cansecwest.com/dojos/2018/exploitlab.html
SyScan360 Singapore 2018 (4 day) March 18-21 https://www.coseinc.com/syscan360/index.php/syscan360/details/SYS1842#regBox
If you are new to the world of ARM exploitation, I highly recommend Azeria's excellent tutorials on ARM Assembly, ARM Shellcode and the basics of ARM exploitation.
https://azeria-labs.com/ Twitter: @Fox0x01
And these are three general purpose concepts oriented tutorials that every systems enthusiast must know:
Operating Systems - A Primer: http://www.slideshare.net/saumilshah/operating-systems-a-primer
How Functions Work: http://www.slideshare.net/saumilshah/how-functions-work-7776073
Introduction to Debuggers: http://www.slideshare.net/saumilshah/introduction-to-debuggers
Saumil Shah @therealsaumil