Part 20 - Hacking Double Primitive Datatype

For a complete table of contents of all the lessons please click below as it will give you a brief of each lesson in addition to the topics it will cover. https://github.com/mytechnotalent/hacking\_c-\_arm64

Today we hack the double from the last lesson.

Let's fire up radare2 in write mode.

radare2 -w ./0x06_asm64_double_primitive_datatype

Let's auto analyze.

aaa

Seek to main.

s main

View disassembly.

v

Let's get back to the terminal view.

q

All we have to do now is write the new value of d0 into the register where the fmov instruction is and quit.

wa mov x0, 0x6666666666666666 @0x000009bc
q

Then we run our new binary.

kali@kali:~/Documents/0x06_double_primitive_datatype$ ./0x06_asm64_double_primitive_datatype
10.2

I hope you enjoyed this series and have a good firm grasp on ARM64 RE!

results matching ""

    No results matching ""