Part 20 - Hacking Double Primitive Datatype
For a complete table of contents of all the lessons please click below as it will give you a brief of each lesson in addition to the topics it will cover. https://github.com/mytechnotalent/hacking\_c-\_arm64
Today we hack the double from the last lesson.
Let’s fire up radare2 in write mode.
radare2 -w ./0x06_asm64_double_primitive_datatype
Let’s auto analyze.
aaa
Seek to main.
s main
View disassembly.
v
Let’s get back to the terminal view.
q
All we have to do now is write the new value of d0 into the register where the fmov instruction is and quit.
wa mov x0, 0x6666666666666666 @0x000009bc
q
Then we run our new binary.
kali@kali:~/Documents/0x06_double_primitive_datatype$ ./0x06_asm64_double_primitive_datatype
10.2
I hope you enjoyed this series and have a good firm grasp on ARM64 RE!
当前内容版权归 mytechnotalent 或其关联方所有,如需对内容或内容相关联开源项目进行关注与资助,请访问 mytechnotalent .