ARM Reverse Engineering (Part 25 – Hacking Boolean Variables)

ARM Reverse Engineering (Part 25 – Hacking Boolean Variables)

For a complete table of contents of all the lessons please click below as it will give you a brief of each lesson in addition to the topics it will cover. https://github.com/mytechnotalent/Reverse-Engineering-Tutorial

Let’s re-examine our code.

No alt text provided for this image

Let’s hack!

No alt text provided for this image

Let’s break at main, run and disas in addition to step into four times. 

No alt text provided for this image

We see that 0 or FALSE is moved into r3 at main+12.

No alt text provided for this image

Very simply we set r3 to 1 or TRUE and continue execution to which we notice that the Boolean variable isHacked is now TRUE.

It’s that simple folks! These elementary examples will help build your mental library of examples of how to approach everything in code and understanding how to take control of code execution no matter what!

Next week we will dive into Integer Variables.

To view or add a comment, sign in

Others also viewed

Explore topics