paint-brush
Developing Shellcode for IoT: A Password-Protected Reverse Shell for ARM Processorsby@syscall59
398 reads
398 reads

Developing Shellcode for IoT: A Password-Protected Reverse Shell for ARM Processors

by Syscall59 - Alan Vivona7mSeptember 3rd, 2019
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

ARM is a Reduced Instruction Set Computing (RISC) processor architecture that is used everywhere these days: mobile phones, smart thermostats, tv’s, wi-fi dongles, cars, credit cards, you name it. After having written a similar payload for Linux/Intel x64 I was curious about how to apply this knowledge to other architectures so I decided to go with ARM since it's an interesting and wide-spread one. ARM has two main instruction set states ARM and Thumb. Thumb instructions are 2 bytes long most of the time while in ARM state instructions are always 4 bytes long.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coin Mentioned

Mention Thumbnail
featured image - Developing Shellcode for IoT: A Password-Protected Reverse Shell for ARM Processors
Syscall59 - Alan Vivona HackerNoon profile picture
Syscall59 - Alan Vivona

Syscall59 - Alan Vivona

@syscall59

Over-featured script kiddie

About @syscall59
LEARN MORE ABOUT @SYSCALL59'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Syscall59 - Alan Vivona HackerNoon profile picture
Syscall59 - Alan Vivona@syscall59
Over-featured script kiddie

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Also published here