ARM Reverse Engineering (Part 25 – Hacking Boolean Variables)

ARM Reverse Engineering (Part 25 – Hacking Boolean Variables)

Kevin ThomasKevin Thomas

Kevin Thomas

Author of the world’s most popular Reverse Engineering Tutorial

Published Feb 9, 2018

For a complete table of contents of all the lessons please click below as it will give you a brief of each lesson in addition to the topics it will cover. https://github.com/mytechnotalent/Reverse-Engineering-Tutorial

Let’s re-examine our code.

No alt text provided for this image

Let’s hack!

No alt text provided for this image

Let’s break at main, run and disas in addition to step into four times. 

No alt text provided for this image

We see that0 orFALSE is moved intor3 at main+12.

No alt text provided for this image

Very simply we setr3 to1 orTRUE and continue execution to which we notice that the Boolean variableisHacked is nowTRUE.

It’s that simple folks! These elementary examples will help build your mental library of examples of how to approach everything in code and understanding how to take control of code execution no matter what!

Next week we will dive into Integer Variables.

To view or add a comment,sign in

More articles by Kevin Thomas

Explore content categories