ARM Reverse Engineering (Part 22 – Hacking Character Variables)

ARM Reverse Engineering (Part 22 – Hacking Character Variables)

For a complete table of contents of all the lessons please click below as it will give you a brief of each lesson in addition to the topics it will cover. https://github.com/mytechnotalent/Reverse-Engineering-Tutorial

Let’s review our code.

No alt text provided for this image

Let’s hack!

No alt text provided for this image

We again see the direct value of 0x6e moved into r3 at main+12 which is our ‘n’.

No alt text provided for this image

After stepping into 4 times and verify the value in r3 which we clearly see as ‘n’.

No alt text provided for this image

Let’s hack the value in r3 to a ‘y’ and then reexamine the value in r3. We can now clearly see it has been changed to ‘y’.

No alt text provided for this image

As we continue we successfully see our hack worked! We see the value of ‘y’ printing to the standard output.

Next week we will dive into Boolean Variables.

要查看或添加评论,请登录

Kevin Thomas的更多文章

社区洞察

其他会员也浏览了