Feb. 7, 2023, 3:16 a.m. | Ajin Deepak

InfoSec Write-ups - Medium infosecwriteups.com

Intro

Let’s start writing ROP chains for ARM64. if you are entirely new to rop chains please refer to this.

https://infosecwriteups.com/rop-chains-on-arm-3f087a95381e

This is similar to that of the ROP chains we did for ARM32. if you are comfortable with understanding ROP chains in the ARM32 This would be very easy for you. This is exactly similar. The only change is that we have new ARM64 assembly instructions.

So let’s start.

Prerequisites

  • ARM64 assembly
  • Familiarity with buffer overflows
  • Should have familiarity …

arm64 ctf ethical hacking exploit development hacking reverse engineering rop

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)