💻
A Noob's Guide To ARM Exploitation
  • About the book
  • Lab setup
  • Introduction to ARM
  • Introduction to stack buffer overflows
  • Introduction to ROP Chains
  • Invoking mprotect() using ROP Chains on ARM
  • Integer Overflows on ARM
  • Introduction to Heap Exploitation
  • Arming the Use-After-Free()
  • Double free() attacks on ARM.
  • Introduction to ARM64
  • Stack-based buffer overflows on ARM64
  • ROP chains on ARM64
  • References
Powered by GitBook
On this page
  • ARM 32
  • ARM 64

Lab setup

PreviousAbout the bookNextIntroduction to ARM

Last updated 2 years ago

For the lab environment, we are going the use already-built images. You should have VMware installed for this.

ARM 32

For ARM32 we are going to use AzeriaLab's VM (Ubuntu 16.04 ) containing an emulated ARMv6l.

Download here:

  • Full on GDrive:

  • Full on Mega.nz:

  • Split on Mega.nz:

  • Split on GDrive:

Password: azerialabs

After downloading this, extract this using 7zip. You can import this using VMware or just double-click on the 'Azeria-Lab-v1.vmx' file. it will be automatically loaded.

After the VM is loaded. Let's emulate our raspberry pi by clicking on the raspberry pi icon (shaded by purple).

After completing the emulation. Let's ssh into the 'raspberry pi' image.

Click on the purple shaded icon.

Now we are ready to do our exploitation.

ARM 64

For ARM 64 we will be using hugsy's aarch ubuntu.

Download this zip and extract this.

I have copied the extracted folder inside my Kali Linux VM.

Now we have to install some qemu-packages.

apt-get install qemu-system-arm
apt-get install qemu-efi-aarch64
apt-get install qemu-utils

After installing these packages. Navigate into the extracted folder.

We can start our aarch64 ubuntu by running the start script. it will take some time.

./start.sh

When it completes the booting process. you can ssh into it using the 'ssh.sh' script present in the folder.

./ssh.sh

The password for the user 'user' is 'user'.

https://drive.google.com/file/d/1uX9fRUX-IHitQVD43QUsz9Aocy8pJ8XK/view?usp=sharing
https://mega.nz/#!1K4k1T5a!hGNAUNbTktPB69dOMRpOT-y2znlIB8LQ1twTp90Uu8s
https://mega.nz/#F!AO5j0ZCJ!ltZHLnXtpLccI4kkr-j2Xw
https://drive.google.com/drive/folders/1p_XdsiVVSGk-LLtSFOov1H1y8z7g_SeK?usp=sharing
BlahCatsBlahCats
Logo