Please create a series of Reverse Engineering Basics! Love this!
@recklessroges5 жыл бұрын
Its like the perfect purity of a man page was compiled into a perfect video. Instructions so clear I accidentally cracked the travelling knapsack problem.
@goosenp5 жыл бұрын
Brilliant "in a nutshell" tutorial of getting to know the program quickly. Could you please do a follow-up of the very same crack me, but with showing how you "crack" the crackme by patching the binary inside Ghidra so that it always jumps to the success condition regardless of the input given?
@gilperon5 жыл бұрын
Wow is that even possible with ghidra?
@zitronenwasser5 жыл бұрын
Gil Bytepatching should be simple, worst case you just use like a Hex Editor and jump to the offset and manually patch ig
@hyronharrison81274 жыл бұрын
@@gilperon its possible i. Gdb, i would hope so! :)
@matthewnoel27814 жыл бұрын
4:07 "a small popup will show up." popup occupies most of screen.
@frankdai5 жыл бұрын
"Let's maximize the window" > Actually makes windows smaller
@ytxstream4 жыл бұрын
And that's Mac OS for you
@Tedd7554 жыл бұрын
@@ytxstream ⌘ + ⌥ + d is your friend
@The_Ballo4 жыл бұрын
@@ytxstream *Java's half-assed implementation of
@powershellaxp644 жыл бұрын
He actually just moved it to the right.
@soulife83833 жыл бұрын
^^ effing owned dude... 😅 By a Polock Frank... sick digs
@S00mbre5 жыл бұрын
Crystal-clear, methodical and systematic walkthrough! Thank you!
@TheMadMagician874 жыл бұрын
Excellent explanation. Clear, concise and a great pace, wasn't confusingly fast or laboriously slow. I hope you continue to make videos on Ghidra.
@l17034 жыл бұрын
wow this tutorial is just perfect, the pace the explanations, everything ! Thank you
@willmcpherson23 жыл бұрын
Beat tutorial I’ve ever seen. Clear, concise and simple.
@frederick35244 жыл бұрын
You have 13.2K subscribers and only 3 videos from 8 months ago! This was such a great video, I was disappointed to see you didn't have more content.
@tyrrelldavis99194 жыл бұрын
Tech KZbinrs always have their view count scaled way down
@edgeeffect3 жыл бұрын
I had a quick look at Ghidra a few weeks ago and it seemed rather complex.... It certainly seems a lot less complex now! Thanks.
@bv14955 жыл бұрын
Jesus you make it look so easy !! Love it ! Keep em coming my friend.
@dsuess3 жыл бұрын
For future listeners, Ghidra is pronounced, "Gee-druh"; [3] /ˈɡiːdrə/[4]). Source: github.com/NationalSecurityAgency/ghidra/wiki/Frequently-asked-questions#how-do-you-pronounce-ghidra Great video, and well-explained usage. Keep up the great work.
@somedude54142 жыл бұрын
(Thank you classic Godzilla movies.)
@user-qi6ig6gb8x5 жыл бұрын
Thank you Ghidra Ninja. You are a true Ninja!!
@Malaphor5 жыл бұрын
"Just hit okay because nobody reads those anyway" Well, I guess I'm a nobody.
@EchoXIIIGO5 жыл бұрын
You sir are a thought criminal reading those agreements... tut tut..
@MichaelJenkin5 жыл бұрын
@@EchoXIIIGO I do recall about 10 years ago, a very prominent software vendor had an Easter egg in the terms and conditions. something about giving away your first born and pledging elegance to satan. It took about 5 or more years for someone to finally read it and mention it. (Mickyj Whitehat)
@thatcrockpot15304 жыл бұрын
@benzo I highly doubt an opensource project would send data to the NSA, I feel like people are very aware of their role in the world, especially floss peeps.
@bitterlemonboy4 жыл бұрын
You must know what you are agreeing to before you agree.
@b213videoz2 ай бұрын
In dialog boxes like that the only buttonnshould be renamed from "Ok" to "Whatever" 🤪
@theleopards41985 жыл бұрын
amazing man keep uploading ghidra tutorials
@dzikibill67565 жыл бұрын
I love it , already subscribed !
@juozasmiskinis35905 жыл бұрын
Thanks ninja! A very well prepared video. Hopefully more will come :)
@andreww35755 жыл бұрын
Fantastic. Hopefully looking forward to more of the same.
@jtw-r Жыл бұрын
love the “NSA-Mainframe” on your terminal. I let out a good laugh at that!
@MichaelJenkin5 жыл бұрын
Nice, I was looking for samples with known outcomes so I could follow the technique ! Awesome . (Mickyj Whitehat)
@cvspvr4 жыл бұрын
you've literally got a black hat on. don't lie
@datenraffzahn60943 жыл бұрын
Many thanks for suggesting this software ... I wanted to look into reverse engineering for years, but had not yet come across such an handy tool. AIDA wasn't really affordable for experimenting ... Again thank you very much!
@abanjoplayer2 жыл бұрын
This helped so much, the main thing I needed was just the fact that you can click on named functions in the decompile window to go to them. Seems obvious but I just didn't know!
@mitfreundlichengrussen12345 жыл бұрын
Thank you - and pls. continue the work. PS: made me smile.
@negritoojosclaros7 ай бұрын
very good video! Im already applying for NSA!
@urnan74993 жыл бұрын
Jidra 😞😭 didnt think that video would stress me out this much 🥶🥶🤯
@AtlasMTBRider5 жыл бұрын
I remember solving that very same Crack me with Hopper. thanks for the video, I have not given GHIDRA a try yet. I'm still learning how to pronounce it correctly :)
@micah93825 жыл бұрын
It is pronounced "Gee-druh" (github.com/NationalSecurityAgency/ghidra/wiki/Frequently-asked-questions#how-do-you-pronounce-ghidra), but that's okay. This video was a very nice introduction, by the way!
@namenone83874 жыл бұрын
wow, nice introduction man. looking forward for more videos from you!
@mohd15015 жыл бұрын
Liked your explaination, easy and clear. Keep going please.
@magi-bv7nd5 ай бұрын
very nice and efficient intro into ghidra gui
@encryptedmind69525 жыл бұрын
awesome video man,keep doing more basic malware analyasis and reversing.Thanks:)
@TheUnusualSuspect1015 жыл бұрын
awesome tutorial - keep them coming man!
@playnikko4 жыл бұрын
Great job explaining - thank you!
@drygordspellweaver87612 жыл бұрын
Very cool, I LOVE Ghidra so far
@valshaev11454 жыл бұрын
Nice introduction! Had have no idea abut Ghidra ;)
@TheChecklists5 жыл бұрын
Your videos are awesome! Please keep making content like this!
@varyktv6 ай бұрын
Great video! You explain things really simply. One question I have: can you use Ghidra to compare two similar .dll written in C++ files to find the differences between them?
@calmic9838 Жыл бұрын
How are you able to run the Unix binary file. Im getting: ```zsh: exec format error: ./rev50_linux64-bit```
3 жыл бұрын
Love this. Keep up the great content man
@AterNyctos9 ай бұрын
Extremely informative! Very good video!
@heycherry1004 жыл бұрын
Good and fast introduction!
@nan68493 жыл бұрын
Thank you for a great overview. I'm getting started quite easily because of this 👍
@GajoFanatico5 жыл бұрын
Excelent. We want more!! Really good tutorials
@HardCoded311033 жыл бұрын
Great job
@SaintSaint4 жыл бұрын
Watched first 11 seconds. subscribed. I think I'm only subscribed to a dozen people after over a decade of being on KZbin.
@osamazaid255 жыл бұрын
Great video. I learned a lot from it.
@jwdsoft4 жыл бұрын
I hope that you create a beginner series in reverse engineering embedded firmware
@NasirKhan-kh4zq3 жыл бұрын
Thanks for wonderful tutorial. Subscribed.
@loremipsum56975 жыл бұрын
THANK YOU FOR DOING GOD'S WORK!
@arieldelgadillo46745 жыл бұрын
Thanks man. I enjoyed you cracking that.
@zraphy-veo55518 ай бұрын
Oh my... this video is amazing! ❤
@williamsquires30704 жыл бұрын
Interesting. When I put the C function prototype for a main() function in, Ghidra wouldn’t even accept “[]”, and I had to use an extra “*” anyway.
@ColtonSpears5 жыл бұрын
Looking forward to more videos like this.
@MiserableLemon5 жыл бұрын
my terminal doesnt allow me to open the crack me initially, you said you're using a VM, is that a different terminal than mac's default?
@MySisterIsASlytherin3 жыл бұрын
nice intro! of course, there's any number of possible solutions given that the only criterion is an @ in 5th position
@georgensa39425 жыл бұрын
love it bruh... keep it up
@liberator483 жыл бұрын
Can you explain what argv[0] is? If argv[1] is the array of arguments.
@stacksmashing3 жыл бұрын
argv[0] is the program Name, 1 is the first argument, 2 the second argument etc :) So if you call “ls /etc” argv[0] contains “ls”
@m4heshd3 жыл бұрын
What Microsoft did right is "Maximize" and the taskbar.
@happyked5 жыл бұрын
Nice video! Do you plan on making more? Id love to see more videos on Ghidra :)
@pouncerminned8635 жыл бұрын
Just curious as I just learned that this tool exists, what is difference using this vs ollydbg for cracking? Other than assembly
@tomay30003 жыл бұрын
Thank you, very instructive.
@cyberuser017 күн бұрын
that was really good, ty !
@buzifalus2 жыл бұрын
Great tutorial, kudos! Can you elaborate why is there an issue requiring the usage of a pointer to a pointer for argv ?
@0xm3trix4 жыл бұрын
The video was very helpful, keep it up bro👍👍
@fade242black5 жыл бұрын
Great video. Keep it up!
@SoCalRobb5 жыл бұрын
Great content, subbed, keep them coming!
@kokop11075 жыл бұрын
Great video. But could you make a video comparing Ghidra to IDA or some other RE tools?
@nxxxxzn5 жыл бұрын
very thorough. thanks
@10dragon4565 жыл бұрын
What VM were you using during this video?
@stacksmashing5 жыл бұрын
None, I have a separate computer where I do this kind of stuff.
@shrutilondhe34017 ай бұрын
Hey when trying to search for main it doesnt show any results and the main function i guess in some format like FUN_11001 some numbers can you tell me some settings to resolve this?
@NotAViper6 ай бұрын
Very good tutorial
@userusms5 жыл бұрын
Thank you for the nice tutorial!
@SureshBhardwaj3 жыл бұрын
cooooooooooooooooooooooooool Loved it!
@gilperon5 жыл бұрын
Great Job! Keep up please.
@osamaalbahrani Жыл бұрын
Great tutorial!
@victors87185 жыл бұрын
That's a great tutorial man ,thx!
@VasaMusic4383 жыл бұрын
great !!! Please, more !!!
@Collidedatoms5 жыл бұрын
It's Gee-druh, not jeye-druh
@ashxxiv5 жыл бұрын
I thought since the g is before the h it would be pronounced as geye-druh fff English has me all sorts of confused
@gamingSlasher11 ай бұрын
Very nice. Great tutorial.
@Tecnoesclavos3 ай бұрын
First Step. Error. Invalid Function Signature Can't parse name: argv[] Do you want to continue editing or abort your changes?
@stacksmashing3 ай бұрын
Set it to char ** argv instead of char * argv[] That’s also how it’s in the video in the second step - I assume [] is now reserved
@Tecnoesclavos3 ай бұрын
@@stacksmashing yep it works, thank you!
@stacksmashing3 ай бұрын
No worries :) hope they eventually support that syntax
@XxManagedxX2 жыл бұрын
Excellent video! Is there a way to isolate and tag raw binary into separate chunks? For example if you read an EEPROM and load it in Ghidra as raw binary can you then split it up into prgrogram, data, etc so that decompiler can make sense of it?
@anntakamaki196011 ай бұрын
Nice video, but I have a question. Is it possible to get the flag without putting the password? Since the flags stored somewhere within the file, right?
@oliviern.20952 жыл бұрын
Great, really great !
@nuszkat99534 жыл бұрын
Waiting for more videos from you.
@TheUltimateLizard4 жыл бұрын
Amazing tutorial
@jaybailey2163 жыл бұрын
Kind of a dumb question but how did you get your keystrokes to show up on the screen like that?
@gabrield64253 жыл бұрын
Thank you for this video!
@urugulu16565 жыл бұрын
wow your using this sucesfully and i fail at a baby shark singing program (basically a less trivial kinda hello world) lol. actually ghidra seems to hate the function definitions of visual studios stdlib...
@geocine2 жыл бұрын
are you planning on doing a course series for this? I would buy it
@P-G-77 Жыл бұрын
Love it.
@nan69623 жыл бұрын
hello, i have followed the same steps as you but my main function looks different. and it says no function in decompiler. please help
@christullier24103 жыл бұрын
I'm having the same problem
@achuthvp52574 жыл бұрын
This was a great video. Amazing explanation but if you could speak a little louder and also put in some energy into your voice it would be even better
@avtem Жыл бұрын
Great video! Do you know how to hide the project window? i'd love to hide that window once i ran the code browser
@AA-gl1dr4 жыл бұрын
Thank you so much!!!
@kawuschel15185 жыл бұрын
Are you on a Mac or is this a Vbox
@sahilshankar27695 жыл бұрын
How do you get the Linux shell on the terminal?
@stacksmashing5 жыл бұрын
It’s a SSH connection into a VM
@sahilshankar27695 жыл бұрын
Ah I see. Thanks for the reply
@ThiagoQwertyuiop7 ай бұрын
Thank you!
@ashokvj83425 жыл бұрын
Thanks man for the knowledge you are awsm
@juliproo39622 жыл бұрын
hi i have a problem: i the analyse just does not start! and if i want to select it from the menu it is gray. can someone help me please? note: im using windows 10
@olee_72774 жыл бұрын
this tutorial is very jay
@tyrrelldavis99194 жыл бұрын
So there are "good" feds? Tell me what the shot is lmao, I'm too bored and see through the veil that most content is staged and fake