Nov. 9, 2023, 4:46 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news






Hello everyone,


In this blog, we will explore integer overflows and their potential to create issues within your software. We will provide a walkthrough of a small CTF binary to illustrate their risks. Before we begin, ensure you meet certain prerequisites below.









Prerequisites










  • Familiarity with ARM64 assembly instructions.


  • ARM64 environment with GEF.


  • Ability to read and understand C code.



If you are new here, we recommend trying out our complete ARM64 Exploitation series.


arm64 assembly binary blog ctf exploitation exploiting hello integer integer overflow malware analysis overflow reversing risks software vulnerability walkthrough

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Senior Security Researcher - Linux MacOS EDR (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Sr. Manager, NetSec GTM Programs

@ Palo Alto Networks | Santa Clara, CA, United States

SOC Analyst I

@ Fortress Security Risk Management | Cleveland, OH, United States