Aug. 23, 2023, 2:46 a.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news






Hello everyone, In this blog post, we’ll look into uninitialized stack variables in ARM64. We explore the dangers posed by these seemingly innocent variables and their potential impact on software security.









Prerequisites



  • Familiarity with ARM64 assembly instructions.


  • ARM64 environment with gef.


  • Ability to read and understand C code.



If you are new here, we recommend trying out our complete ARM64 Exploitation series.


arm64 assembly blog blog post environment exploitation exploiting hello impact malware analysis reversing security software software security stack understand variable vulnerability

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Information Security Specialist, Sr. (Container Hardening)

@ Rackner | San Antonio, TX

Principal Security Researcher (Advanced Threat Prevention)

@ Palo Alto Networks | Santa Clara, CA, United States

EWT Infosec | IAM Technical Security Consultant - Manager

@ KPMG India | Bengaluru, Karnataka, India

Security Engineering Operations Manager

@ Gusto | San Francisco, CA; Denver, CO; Remote

Network Threat Detection Engineer

@ Meta | Denver, CO | Reston, VA | Menlo Park, CA | Washington, DC