ARM Reverse Engineering (Part 24 – Debugging Boolean Variables)

ARM Reverse Engineering (Part 24 – Debugging Boolean Variables)

For a complete table of contents of all the lessons please click below as it will give you a brief of each lesson in addition to the topics it will cover. https://github.com/mytechnotalent/Reverse-Engineering-Tutorial

Let’s re-examine our code.

No alt text provided for this image

Let’s debug.

No alt text provided for this image

Let’s step 4 times and disassemble.

No alt text provided for this image

Let’s examine what is now in r3.

No alt text provided for this image

As we can clearly see the value in isHacked is 0 or false which makes sense based on our c++ source code.

I know these lessons may seem trivial however Reverse Engineering is all about breaking things down in their most basic components. Reverse Engineering is about patience and logical flow. It is critical that you take the time and work through all of these examples with a Raspberry Pi device so that you can have a proper appreciation for how the process actually works.

Next week we will dive into Hacking Boolean Variables.

To view or add a comment, sign in

Others also viewed

Explore topics