Awesome
0x05_arm_32_hacking_char
ARM 32-bit Raspberry Pi Hacking Char example in Kali Linux..
<br>Join DC540 Discord HERE
<br>FREE Reverse Engineering Self-Study Course HERE
<br>Schematic
Parts
Raspberry Pi 4<br> 64GB Micro SD Card<br> Micro SD Card Reader/Writer
STEP 1: Download Kali Linux ARM Image - Raspberry Pi 32-bit
Download [https://www.offensive-security.com/kali-linux-arm-images/]
STEP 2: Download balenaEtcher
STEP 3: Flash Kali Linux ARM Image
STEP 4: Power Up RPI & Login
POWER UP DEVICE AND LOGIN AS KALI AND SET UP SSH
STEP 5: Create File In VIM
#include <stdio.h>
int main()
{
char x;
x = 'h';
printf("%c\n", x);
return 0;
}
STEP 6: Save File As - 0x05_arm_32_hacking_char.c [:wq]
STEP 7: Build & Link
gcc -o 0x05_arm_32_hacking_char 0x05_arm_32_hacking_char.c
STEP 8: Run Binary
./0x05_arm_32_hacking_char
h
STEP 9: Run Radare2 - Debug Mode
r2 -d ./0x05_arm_32_hacking_char
STEP 10: Run Radare2 - Debug Step 1 [Examine Binary @ Entry Point]
aaa
s main
vv
STEP 11: Run Radare2 - Debug Step 2 [Examine char]
q
[0x0044a50c]> pf x @0x0044a512
0x0044a512 = 0x71fb2368
STEP 12: Run Radare2 - Debug Step 3 [Hack char]
[0x0044a50c]> wa mov r3, 0x69 @0x0044a512
STEP 13: Run Radare2 - Debug Step 4 [Review Hack]
[0x0044a50c]> pf x @0x0044a512
0x0044a512 = 0x71fb2369
STEP 14: Run Radare2 - Debug Step 5 [Hack Binary Permanently]
q
r2 -w ./0x05_arm_32_hacking_char
[0x00000400]> aaa
[0x00000400]> s main
[0x00000510]> vv
q
[0x0000050c]> wa mov r3, 0x69 @0x00000512
STEP 15: Prove Hack
./0x05_arm_32_hacking_char
i
Contributing
Pull requests are welcome. For major changes, please open an issue first to discuss what you would like to change.
Please make sure to update tests as appropriate.