pwnhard

Arms Roped

hackthebox

Task: ARM 32-bit binary exploitation under QEMU user-mode with PIE, Canary, and NX enabled. Solution: Multi-stage ROP chain — leak canary via partial overwrite, leak PIE base from saved LR, use ARM ret2csu to leak libc via GOT, then ret2libc with system("/bin/sh").

$ ls tags/ techniques/
canary_leak_partial_overwritepie_leak_saved_lrarm_ret2csulibc_leak_via_got_putsret2libc_system_binshmulti_stage_ropbyte_by_byte_leak

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]