Reverse Engineering w/GDB and Ghidra! | picoCTF 2022 #08 "Keygenme"

Reverse Engineering w/GDB and Ghidra! | picoCTF 2022 #08 "Keygenme"

Jason Turley

1 год назад

20,008 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

@kromaki131
@kromaki131 - 20.10.2023 14:36

Awesome video. I was looking for Ghidra introduction video because I'm new to it and then found yours.
I didn't expect to have a great introduction to gdb too! It's not only helpful but also motivative. Thank you.

Ответить
@rrkatamakata7874
@rrkatamakata7874 - 24.09.2023 16:17

Do you have any guides for learning reverse engineering. The tools that you use and or the paths tat you recommend

Ответить
@skrillyvito4232
@skrillyvito4232 - 18.08.2023 00:13

This was super helpful man thanks a lot

Ответить
@nyxon_x
@nyxon_x - 21.07.2023 16:49

Hello, can i ask you why you can't find these values that the executable pushes onto the stack via Ghidra and you have to execute it via GBD and print them before returning? Where are these values coming from if they are not hardcoded somewhere? Are they obfuscated?
--edit
watching it again i see the MD5 uses the flag_pieces, which are hardcoded values, so theoretically you can reproduce this section of code and find the rest of the flag without GDB? I guess GDB is faster in this case, but i was wondering if there is something more i am missing.

Ответить
@Meodoc
@Meodoc - 19.06.2023 02:14

Thanks! I have never used gdb (or ghidra) before, and with your help I managed to do my first reverse-engineering assignment for my university! :)

Ответить
@user-ql6rp7dr9m
@user-ql6rp7dr9m - 20.03.2023 02:34

I really respect you and your hacking skills. Thanks for the video.

Ответить
@PoliticalPanic
@PoliticalPanic - 19.03.2023 03:21

nice - thx for sharing.

Ответить
@Womacko
@Womacko - 09.03.2023 00:53

Your videos are totally underrated. This is pure gold for getting started. Thanks for the walkthrough. Stumbled across your channel when looking for "reverse engineering assembly" videos :) Please keep it up and keep uploading. Following!

Ответить
@etopowertwon
@etopowertwon - 24.02.2023 15:38

I really wish debug in ghidra was not so complicated. It could probably rival x96dbg, which I really really miss in linux, as no amount of gefs make gdb comfy for common operations

Ответить
@theadorelogon112
@theadorelogon112 - 17.12.2022 17:13

Nice demo! GDB is so sweet. Radare has always been my goto for reversing but I'm trying to experiment with Ghidra so a straight example like this was awesome. Also, thanks for not being obnoxious. I'll gently place a like and subscribe on this channel.

Ответить