Skip to content

mytechnotalent/0x05-ARM-32-Hacking_Char

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

15 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

image

FREE Reverse Engineering Self-Study Course HERE


0x05_arm_32_hacking_char

ARM 32-bit Raspberry Pi Hacking Char example in Kali Linux..


Join DC540 Discord HERE


Schematic

image


Parts

Raspberry Pi 4
64GB Micro SD Card
Micro SD Card Reader/Writer


STEP 1: Download Kali Linux ARM Image - Raspberry Pi 32-bit

Download [https://www.offensive-security.com/kali-linux-arm-images/]

STEP 2: Download balenaEtcher

Download

STEP 3: Flash Kali Linux ARM Image

Watch YT Null Byte Video

STEP 4: Power Up RPI & Login

POWER UP DEVICE AND LOGIN AS KALI AND SET UP SSH

STEP 5: Create File In VIM

#include <stdio.h>

int main()
{
    char x;

    x = 'h';

    printf("%c\n", x);

    return 0;
}

STEP 6: Save File As - 0x05_arm_32_hacking_char.c [:wq]

STEP 7: Build & Link

gcc -o 0x05_arm_32_hacking_char 0x05_arm_32_hacking_char.c

STEP 8: Run Binary

./0x05_arm_32_hacking_char
h

STEP 9: Run Radare2 - Debug Mode

r2 -d ./0x05_arm_32_hacking_char

STEP 10: Run Radare2 - Debug Step 1 [Examine Binary @ Entry Point]

aaa
s main
vv

image

STEP 11: Run Radare2 - Debug Step 2 [Examine char]

q
[0x0044a50c]> pf x @0x0044a512
0x0044a512 = 0x71fb2368

STEP 12: Run Radare2 - Debug Step 3 [Hack char]

[0x0044a50c]> wa mov r3, 0x69 @0x0044a512

STEP 13: Run Radare2 - Debug Step 4 [Review Hack]

[0x0044a50c]> pf x @0x0044a512
0x0044a512 = 0x71fb2369

STEP 14: Run Radare2 - Debug Step 5 [Hack Binary Permanently]

q
r2 -w ./0x05_arm_32_hacking_char
[0x00000400]> aaa
[0x00000400]> s main
[0x00000510]> vv

image

q
[0x0000050c]> wa mov r3, 0x69 @0x00000512

STEP 15: Prove Hack

./0x05_arm_32_hacking_char
i

License

Apache License, Version 2.0