Skip to content

mytechnotalent/0x02-ARM-32-Hacking-Int

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

image

FREE Reverse Engineering Self-Study Course HERE


0x02_arm_32_hacking_int

ARM 32-bit Raspberry Pi Hacking Int example in Kali Linux.


Join DC540 Discord HERE


Schematic

image


Parts

Raspberry Pi 4
64GB Micro SD Card
Micro SD Card Reader/Writer


STEP 1: Download Kali Linux ARM Image - Raspberry Pi 32-bit

Download [https://www.offensive-security.com/kali-linux-arm-images/]

STEP 2: Download balenaEtcher

Download

STEP 3: Flash Kali Linux ARM Image

Watch YT Null Byte Video

STEP 4: Power Up RPI & Login

POWER UP DEVICE AND LOGIN AS KALI AND SET UP SSH

STEP 5: Create File In VIM

#include <stdio.h>

int main()
{
    int x;

    x = 10;

    printf("%i\n", x);

    return 0;
}

STEP 6: Save File As - 0x02_arm_32_hacking_int.c [:wq]

STEP 7: Build & Link

gcc -o 0x02_arm_32_hacking_int 0x02_arm_32_hacking_int.c

STEP 8: Run Binary

./0x02_arm_32_hacking_int
10

STEP 9: Run Radare2 - Debug Mode

r2 -d ./0x02_arm_32_hacking_int

STEP 10: Run Radare2 - Debug Step 1 [Examine Binary @ Entry Point]

aaa
s main
vv

image

STEP 11: Run Radare2 - Debug Step 2 [Examine int]

q
[0x0041b50c]> pf C @0x0041b512
0x0041b512 = 10

STEP 12: Run Radare2 - Debug Step 3 [Hack int]

[0x0041b50c]> wa mov r3, 0xd @0x00470512

STEP 13: Run Radare2 - Debug Step 4 [Review Hack]

[0x0041b50c]> pf C @0x0041b512
0x0041b512 = 13

STEP 14: Run Radare2 - Debug Step 5 [Hack Binary Permanently]

q
r2 -w ./0x02_arm_32_hacking_int
[0x000003fc]> aaa
[0x000003fc]> s main
[0x0000050c]> vv

image

[0x0000050c]> wa mov r3, 0xd @0x00000512
q

STEP 15: Prove Hack

./0x02_arm_32_hacking_int
13

License

Apache License, Version 2.0