May I ask if you have tried to compile unicorn from source? I tried to compile unicorn static libraries for arm64 architecture and failed.
@anntakamaki196010 ай бұрын
Thanks sir
@Bchicken211 ай бұрын
Great content!
@rho99211 ай бұрын
bhai mere professors ne banaya hai angr Fish Wang (ASU)
@DonghaoQiu Жыл бұрын
If the the polyglot is a valid archx86 binary, and it print the flag by itself, y not just execute it directly in the VM?
@RE_Adventures Жыл бұрын
Yes you're kinda correct, because that file is not a valid PE/ELF file, it is basically x86 & Aarch64 shellcode combined, as can be determine by the file size & the absence of a header. But you can totally load that shellcode using some tools, or copying that bytecode into a C file & calling it directly. You can also copy the aarch64 shellcode into a C file, compile it with a cross compiler & then run it with qemu, to get the aarch64 flag as well, that's also a viable solution In this video I wanted to depict yet another method of solving these type of challenges by emulating code
@mdraihanahmed7465 Жыл бұрын
Didn't you feel the necessity of sharing the image link with your video? Is this video at all useful without that img?
@dream0283 Жыл бұрын
nice video!!
@RE_Adventures Жыл бұрын
Thank you
@drygordspellweaver8761 Жыл бұрын
z3 looks pretty robust
@RE_Adventures Жыл бұрын
Yes z3 is pretty amazing
@zinhtet1112 Жыл бұрын
Thank you for your video!
@RE_Adventures Жыл бұрын
Glad it was helpful!
@cryptoace8337 Жыл бұрын
really cool stuff!. the second challenge can also be solved using stegsolve and image combiner which basically does the same XOR but without having the need to write a python script for it.
@RE_Adventures Жыл бұрын
Thanks. Yes you're right, second challenge can be solved using tools like stegsolver, I depicted just another method to solve that.
@P0K02 жыл бұрын
Sir ji, can you you make a video on: control flow flattening with LLVM and control flow unflattening techniques with RE knowledge .
@RE_Adventures2 жыл бұрын
That topic is beyond my expertise, but once I learn this topic, I will definately make a video on this
@P0K02 жыл бұрын
@@RE_Adventures fair enough, appreciated ❤️
@P0K02 жыл бұрын
That's something nice , keep the great work 👏
@RE_Adventures2 жыл бұрын
Thank you so much 💜
@prakashyadav0082 жыл бұрын
nice video. Could u make a more detailed video on Capstone
@RE_Adventures2 жыл бұрын
Thanks for the feedback. I will surely make a tutorial on Capstone
@rameshsarkar96182 жыл бұрын
bhaiya reverse engineering and binary exploitation pe tuition dedo bohot hard lag raha hein..
@RE_Adventures2 жыл бұрын
Indeed, reversing & pwning is hard to learn, because you have so much to learn at the starting, but once you learn the basics you will have a fun time learning & solving ctf challenges. For reversing, I would suggest you to learn assembly first. Also you can watch my baby-cpp video, in which I explained how to reverse a c++ binary. For pwning, just go to liveoverflow's channel & watch its binary exploitation series, I have learnt pwning from that. Other than that just have fun while learning rev & pwn, because it is a long, but fun, journey
@127.2 жыл бұрын
Nice work!
@RE_Adventures2 жыл бұрын
Thank you!
@RE_Adventures2 жыл бұрын
The problem at 21:30 is that we are calling the simple sqrt function, but in the binary it was actually calling std::sqrt, which makes sense because when I added the namespace std, the binary matched which confirms the same.
@mohneeshsharma2 жыл бұрын
Nice video bhaiya!!!
@asfdfuck2 жыл бұрын
🔥🔥❤❤
@shinvipo2 жыл бұрын
Can you briefly explain how it work?
@RE_Adventures2 жыл бұрын
In the most basic words using symbolic execution we can tell it(angr) to go explore each and every path of the binary provided until it errors out or completes execution(deadend). After the execution completes, the manager contains a list of all the states, from those states we are only interested in the ones which executed successfully, ie deadend, then we iterate through each & every state & check if the input given contains the flag's initial character, if so that is our input that we are looking for. Hope it helps
@TheCyberExpert2 жыл бұрын
Was looking for a z3 tutorial for a long time, Great Video👍
@Kartikeyj962 жыл бұрын
Excellent Video !!. I think it is the best way to solve obfusacted binaries. Thank you