Part 49 – Hacking Post-Decrement Operator
For a complete table of contents of all the lessons please click below as it will give you a brief of each lesson in addition to the topics it will cover. https://github.com/mytechnotalent/Reverse-Engineering-Tutorial
Let’s once again review our code.
#include <iostream>
int main(void) {
int myNumber = 16;
int myNewNumber = myNumber--;
std::cout << myNewNumber << std::endl;
std::cout << myNumber << std::endl;
return 0;
}
Let’s review last week’s debug.
As we can see here the value in r1 at main+68 is 15. Let’s hack!
Once again we have manipulated and changed program execution to our own bidding. With each of these bite-size lessons you continue to get a better grasp on the processor and how it interfaces with the binary.
I hope this series gives you a solid framework for understanding the ARM processor. This concludes the series. Thank you all for coming along on the journey!