Part 20 - Hacking Double Primitive Datatype

For a complete table of contents of all the lessons please click below as it will give you a brief of each lesson in addition to the topics it will cover. https://github.com/mytechnotalent/hacking\_c-\_arm64

Today we hack the double from the last lesson.

Let’s fire up radare2 in write mode.

  1. radare2 -w ./0x06_asm64_double_primitive_datatype

Let’s auto analyze.

  1. aaa

Seek to main.

  1. s main

View disassembly.

  1. v

Let’s get back to the terminal view.

  1. q

All we have to do now is write the new value of d0 into the register where the fmov instruction is and quit.

  1. wa mov x0, 0x6666666666666666 @0x000009bc
  2. q

Then we run our new binary.

  1. kali@kali:~/Documents/0x06_double_primitive_datatype$ ./0x06_asm64_double_primitive_datatype
  1. 10.2

I hope you enjoyed this series and have a good firm grasp on ARM64 RE!