ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux.
Join DC540 Discord HERE
FREE Reverse Engineering Self-Study Course HERE
Raspberry Pi 4
64GB Micro SD Card
Micro SD Card Reader/Writer
Download [https://www.offensive-security.com/kali-linux-arm-images/]
POWER UP DEVICE AND LOGIN AS KALI AND SET UP SSH
.global _start
_start:
print_hello_world:
mov R0, #1 @ 1 = stdout
ldr R1, =hello_world @ str pointer
mov R2, #13 @ str len
mov R7, #4 @ linux write syscall
svc 0 @ software interrupt call write
exit:
mov R0, #0 @ return code
mov R7, #1 @ linux exit syscall
svc 0 @ software interrupt call exit
.data
hello_world: .ascii "Hello World!\n"
as -o 0x01_arm_32_hacking_hello_world.o 0x01_arm_32_hacking_hello_world.s
ld -o 0x01_arm_32_hacking_hello_world 0x01_arm_32_hacking_hello_world.o
./0x01_arm_32_hacking_hello_world
Hello World!
r2 -d ./0x01_arm_32_hacking_hello_world
aaa
s entry0
vv
q
[0x00010074]> pf S @0x00010094
0x00010094 = 0x00010094 -> 0x00020098 "Hello World!
A�"
w Hacked World\n @0x00020098
[0x00010074]> pf S @0x00010094
0x00010094 = 0x00010094 -> 0x00020098 "Hacked World
A�"
q
r2 -w ./0x01_arm_32_hacking_hello_world
[0x00010074]> w Hacked World\n @0x00020098
[0x00010074]> q
./0x01_arm_32_hacking_hello_world
Hacked World
Pull requests are welcome. For major changes, please open an issue first to discuss what you would like to change.
Please make sure to update tests as appropriate.