Processing math: 100%

The Book of Gehn

I found 9 posts.


Smashing ARM Stack for Fun - Part VII

Tags: reversing, exploiting, ARM, iasm, azeria-labs, egg, shellcode, PIC

February 4, 2021

It’s time to solve the last challenge of this 7 parts serie.


Smashing ARM Stack for Fun - Part VI

Tags: reversing, exploiting, ARM, iasm, azeria-labs, egg, shellcode, PIC

January 26, 2021

We have the same vulnerability than we have in stack4 but this time we will make our own egg/shellcode.


Smashing ARM Stack for Fun - Part V

Tags: reversing, exploiting, ARM, iasm, azeria-labs, egg, shellcode

January 20, 2021

Fifth challenge with a small introduction to process continuation.


Smashing ARM Stack for Fun - Part IV

Tags: reversing, exploiting, ARM, iasm, azeria-labs, objdump

January 19, 2021

This time the goal is to make the program print the message "code flow successfully changed".


Smashing ARM Stack for Fun - Part III

Tags: reversing, exploiting, ARM, iasm, azeria-labs

January 18, 2021

Another fast moving post about exploiting the third Arm challenge


Smashing ARM Stack for Fun - Part II

Tags: reversing, exploiting, ARM, iasm, azeria-labs

January 17, 2021

This is going to be a fast moving post, directly to the details, about exploiting the second Arm challenge


Smashing ARM Stack for Fun - Part I

Tags: reversing, exploiting, ARM, qemu, iasm, azeria-labs

January 14, 2021

This is the first of a serie of posts about exploiting 32 bits Arm binaries.

These challenges were taken from Azeria Labs.


iasm: Interactive Assembler

Tags: ARM, reversing, iasm

January 9, 2021

I crossed with a series of Arm challenges by causality and I decided to give it a shoot.

But I have 0 knowledge about Arm so the disassembly of the binaries were too strange for me.

I stepped back to plan it better: my idea was to use GDB to debug small snippets of Arm code, learn about it before jumping into the challenges.

I setup a QEMU virtual machine running Rasbian in an Arm CPU.

With a GCC and GDB running there I started but the compile-load-debug cycle was too inflexible.

I could not use it to explore.

If I wanted to see the effect of a particular instruction I needed to write it in assembly, compile it and debug it.

And the time between the “what does X?” and the “X does this” was too large, reducing the momentum that you have when you explore something new.

Too tedious.

So I decided to shorten the cycle writing an interactive assembler.


Review Arm Assembly

Tags: ARM, reversing, iasm

January 4, 2021

There is no other way to learn something that playing with it.

Take assembly code, read it and predice what will do. Then test it.

Those mistakes, those mismatches between what you think and what it really is, those surprises are what move us forward into learning. Deeper.

In this post I will dig into Arm, assisted with an interactive assembler.

- Martin Di Paola