all InfoSec news
ARM64 Reversing And Exploitation Part 8 – Exploiting an Integer Overflow Vulnerability
Malware Analysis, News and Indicators - Latest topics malware.news
Hello everyone,
In this blog, we will explore integer overflows and their potential to create issues within your software. We will provide a walkthrough of a small CTF binary to illustrate their risks. Before we begin, ensure you meet certain prerequisites below.
Prerequisites
Familiarity with ARM64 assembly instructions.
ARM64 environment with GEF.
Ability to read and understand C code.
If you are new here, we recommend trying out our complete ARM64 Exploitation series.
arm64 assembly binary blog ctf exploitation exploiting hello integer integer overflow malware analysis overflow reversing risks software vulnerability walkthrough