Nov. 9, 2023, 4:46 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news






Hello everyone,


In this blog, we will explore integer overflows and their potential to create issues within your software. We will provide a walkthrough of a small CTF binary to illustrate their risks. Before we begin, ensure you meet certain prerequisites below.









Prerequisites










  • Familiarity with ARM64 assembly instructions.


  • ARM64 environment with GEF.


  • Ability to read and understand C code.



If you are new here, we recommend trying out our complete ARM64 Exploitation series.


arm64 assembly binary blog ctf exploitation exploiting hello integer integer overflow malware analysis overflow reversing risks software vulnerability walkthrough

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Information Security Specialist, Sr. (Container Hardening)

@ Rackner | San Antonio, TX

Principal Security Researcher (Advanced Threat Prevention)

@ Palo Alto Networks | Santa Clara, CA, United States

EWT Infosec | IAM Technical Security Consultant - Manager

@ KPMG India | Bengaluru, Karnataka, India

Security Engineering Operations Manager

@ Gusto | San Francisco, CA; Denver, CO; Remote

Network Threat Detection Engineer

@ Meta | Denver, CO | Reston, VA | Menlo Park, CA | Washington, DC