Пікірлер
@markuche1337
@markuche1337 Ай бұрын
Thanks ❤
@opmfa1850
@opmfa1850 Ай бұрын
excellent
@bske-h6j
@bske-h6j 8 ай бұрын
May I ask if you have tried to compile unicorn from source? I tried to compile unicorn static libraries for arm64 architecture and failed.
@anntakamaki1960
@anntakamaki1960 10 ай бұрын
Thanks sir
@Bchicken2
@Bchicken2 11 ай бұрын
Great content!
@rho992
@rho992 11 ай бұрын
bhai mere professors ne banaya hai angr Fish Wang (ASU)
@DonghaoQiu
@DonghaoQiu Жыл бұрын
If the the polyglot is a valid archx86 binary, and it print the flag by itself, y not just execute it directly in the VM?
@RE_Adventures
@RE_Adventures Жыл бұрын
Yes you're kinda correct, because that file is not a valid PE/ELF file, it is basically x86 & Aarch64 shellcode combined, as can be determine by the file size & the absence of a header. But you can totally load that shellcode using some tools, or copying that bytecode into a C file & calling it directly. You can also copy the aarch64 shellcode into a C file, compile it with a cross compiler & then run it with qemu, to get the aarch64 flag as well, that's also a viable solution In this video I wanted to depict yet another method of solving these type of challenges by emulating code
@mdraihanahmed7465
@mdraihanahmed7465 Жыл бұрын
Didn't you feel the necessity of sharing the image link with your video? Is this video at all useful without that img?
@dream0283
@dream0283 Жыл бұрын
nice video!!
@RE_Adventures
@RE_Adventures Жыл бұрын
Thank you
@drygordspellweaver8761
@drygordspellweaver8761 Жыл бұрын
z3 looks pretty robust
@RE_Adventures
@RE_Adventures Жыл бұрын
Yes z3 is pretty amazing
@zinhtet1112
@zinhtet1112 Жыл бұрын
Thank you for your video!
@RE_Adventures
@RE_Adventures Жыл бұрын
Glad it was helpful!
@cryptoace8337
@cryptoace8337 Жыл бұрын
really cool stuff!. the second challenge can also be solved using stegsolve and image combiner which basically does the same XOR but without having the need to write a python script for it.
@RE_Adventures
@RE_Adventures Жыл бұрын
Thanks. Yes you're right, second challenge can be solved using tools like stegsolver, I depicted just another method to solve that.
@P0K0
@P0K0 2 жыл бұрын
Sir ji, can you you make a video on: control flow flattening with LLVM and control flow unflattening techniques with RE knowledge .
@RE_Adventures
@RE_Adventures 2 жыл бұрын
That topic is beyond my expertise, but once I learn this topic, I will definately make a video on this
@P0K0
@P0K0 2 жыл бұрын
@@RE_Adventures fair enough, appreciated ❤️
@P0K0
@P0K0 2 жыл бұрын
That's something nice , keep the great work 👏
@RE_Adventures
@RE_Adventures 2 жыл бұрын
Thank you so much 💜
@prakashyadav008
@prakashyadav008 2 жыл бұрын
nice video. Could u make a more detailed video on Capstone
@RE_Adventures
@RE_Adventures 2 жыл бұрын
Thanks for the feedback. I will surely make a tutorial on Capstone
@rameshsarkar9618
@rameshsarkar9618 2 жыл бұрын
bhaiya reverse engineering and binary exploitation pe tuition dedo bohot hard lag raha hein..
@RE_Adventures
@RE_Adventures 2 жыл бұрын
Indeed, reversing & pwning is hard to learn, because you have so much to learn at the starting, but once you learn the basics you will have a fun time learning & solving ctf challenges. For reversing, I would suggest you to learn assembly first. Also you can watch my baby-cpp video, in which I explained how to reverse a c++ binary. For pwning, just go to liveoverflow's channel & watch its binary exploitation series, I have learnt pwning from that. Other than that just have fun while learning rev & pwn, because it is a long, but fun, journey
@127.
@127. 2 жыл бұрын
Nice work!
@RE_Adventures
@RE_Adventures 2 жыл бұрын
Thank you!
@RE_Adventures
@RE_Adventures 2 жыл бұрын
The problem at 21:30 is that we are calling the simple sqrt function, but in the binary it was actually calling std::sqrt, which makes sense because when I added the namespace std, the binary matched which confirms the same.
@mohneeshsharma
@mohneeshsharma 2 жыл бұрын
Nice video bhaiya!!!
@asfdfuck
@asfdfuck 2 жыл бұрын
🔥🔥❤❤
@shinvipo
@shinvipo 2 жыл бұрын
Can you briefly explain how it work?
@RE_Adventures
@RE_Adventures 2 жыл бұрын
In the most basic words using symbolic execution we can tell it(angr) to go explore each and every path of the binary provided until it errors out or completes execution(deadend). After the execution completes, the manager contains a list of all the states, from those states we are only interested in the ones which executed successfully, ie deadend, then we iterate through each & every state & check if the input given contains the flag's initial character, if so that is our input that we are looking for. Hope it helps
@TheCyberExpert
@TheCyberExpert 2 жыл бұрын
Was looking for a z3 tutorial for a long time, Great Video👍
@Kartikeyj96
@Kartikeyj96 2 жыл бұрын
Excellent Video !!. I think it is the best way to solve obfusacted binaries. Thank you
@KaranKumar-ov6pm
@KaranKumar-ov6pm 2 жыл бұрын
great buddy