Mastering Malware Analysis - Second Edition by Alexey Kleymenov & Amr Thabet

Mastering Malware Analysis - Second Edition by Alexey Kleymenov & Amr Thabet

Author:Alexey Kleymenov & Amr Thabet
Language: eng
Format: epub
Publisher: Packt
Published: 2022-11-15T00:00:00+00:00


Linux shellcode for ARM

The shellcode on ARM systems is very similar to the shellcode that uses the x86 instruction set. It’s even easier for the shellcode authors to write in ARM as they don’t have to use the call/pop technique or fstenv to get the absolute address. In ARM assembly language, you can access the program counter register (pc) directly from the code, which makes this even simpler. Instead of int 0x80 or syscall, the shellcode uses svc #0 or svc #1 to execute a system function. An example of ARM shellcode for executing a local shell is as follows:

_start: add r0, pc, #12 mov r1, #0 mov r2, #0 mov r7, #11 ; execve system call ID svc #1 .ascii "/bin/sh"

In the preceding code, the shellcode sets r0 with the program counter (pc) + 12 to point to the /bin/sh string. Then, it sets the remaining arguments for the execve system call and calls the svc instruction to execute the code.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Developing Robust Date and Time Oriented Applications in Oracle Cloud by Michal Kvet(3201)
Serverless ETL and Analytics with AWS Glue by Vishal Pathak Subramanya Vajiraya Noritaka Sekiyama Tomohiro Tanaka Albert Quiroga Ishan Gaur(2781)
Practical Guide to Azure Cognitive Services by Chris Seferlis & Christopher Nellis & Andy Roberts(2299)
Unity Artificial Intelligence Programming - Fifth Edition by Dr. Davide Aversa(1957)
Open Source Projects - Beyond Code by John Mertic(1841)
The AI Product Manager's Handbook by Irene Bratsis(1833)
Graph Data Modeling in Python by Gary Hutson and Matt Jackson(1809)
Cloud Auditing Best Practices by Shinesa Cambric & Michael Ratemo(1443)
Aligning Security Operations with the MITRE ATT&CK Framework by Rebecca Blair(1430)
Graph Data Processing with Cypher by Ravindranatha Anthapu(1139)
Data Literacy in Practice by Angelika Klidas Kevin Hanegan(1128)
Applied Machine Learning and High-Performance Computing on AWS by Mani Khanuja | Farooq Sabir | Shreyas Subramanian | Trenton Potgieter(1125)
Fuzzing Against the Machine: Automate vulnerability research with emulated IoT devices on QEMU by Antonio Nappa Eduardo Blazquez(972)
Implementing Multifactor Authentication: Protect your applications from cyberattacks with the help of MFA by Marco Fanti(970)
The AI Product Manager's Handbook: Develop a product that takes advantage of machine learning to solve AI problems by Irene Bratsis(856)
Data Literacy in Practice - A complete guide to data literacy and making smarter decisions with data through intelligent actions (2022) by Packt(849)
The SQL Workshop by Frank Solomon(822)
Graph Data Processing with Cypher by Anthapu Ravindranatha;(796)
Serverless Machine Learning with Amazon Redshift ML: Create, train, and deploy machine learning models using familiar SQL commands by Debu Panda Phil Bates Bhanu Pittampally Sumeet Joshi(746)
Network Automation with Go by Nicolas Leiva & Michael Kashin(632)