ARM 32-bit Raspberry Pi Hacking Double example in Kali Linux.
Join DC540 Discord HERE
FREE Reverse Engineering Self-Study Course HERE
Raspberry Pi 4
64GB Micro SD Card
Micro SD Card Reader/Writer
Download [https://www.offensive-security.com/kali-linux-arm-images/]
POWER UP DEVICE AND LOGIN AS KALI AND SET UP SSH
#include <stdio.h>
int main()
{
double x;
x = 10.987654321;
printf("%0.9f\n", x);
return 0;
}
gcc -o 0x04_arm_32_hacking_double 0x04_arm_32_hacking_double.c
./0x04_arm_32_hacking_double
10.987654321
r2 -d ./0x04_arm_32_hacking_double
aaa
s main
vv
q
[0x0043f510]> pf x @0x0043f538
0x0043f538 = 0xd3c0e56c
REMEMBER LITTLE ENDIAN!
[0x0043f510]> w \x71\x7c\xc9\xd3 @0x0043f538
[0x0043f510]> pf x @0x0043f538
0x0043f538 = 0xd3c97c71
q
r2 -w ./0x04_arm_32_hacking_double
[0x00000400]> aaa
[0x00000400]> s main
[0x00000510]> vv
[0x00000510]> w \x71\x7c\xc9\xd3 @0x00000538
q
./0x04_arm_32_hacking_double
10.987654322
Pull requests are welcome. For major changes, please open an issue first to discuss what you would like to change.
Please make sure to update tests as appropriate.