Hi everyone! I hope that you enjoy the content we put together for these videos. If you have questions, feel free to reach out to the Instructor on twitter twitter.com/wrongbaud. All of the course details can be found here: hackaday.io/project/172292-introduction-to-reverse-engineering-with-ghidra
@suniliyengar86532 жыл бұрын
This class series is the best I have seen so far. I am so impressed by the clarity of the explanation. This course just made me enjoy learning so much! Thank you, you are the best teacher.
@Mishanya0011 ай бұрын
Thanks, you have a very good lesson series of Ghidra
@ITOzann4 жыл бұрын
Thank you for the content!
@redpillcommando4 жыл бұрын
Thank you for this video.
@Yocairo3 жыл бұрын
Good course material, thanks!
@RevUntoMan3 жыл бұрын
This course is great! I'm learning a lot! Does anyone have a walkthrough for solving /variables-example ?
@ahmedadel33012 жыл бұрын
If you did it, could you share the solution?!
@RussellTeapot6 ай бұрын
@@ahmedadel3301 I assume you moved on by now :D but for everyone that's stuck, I cheated a bit: I just wrote a C program that prints the correct characters applying the operations found in the decompiled pseudocode provided by Ghidra. Pay attention to the global variables involved ;) I wont disclose anything else tho, good luck :)
@ivanrubalcava7109 Жыл бұрын
Thank you very helpful!👍
@baruchben-david41963 жыл бұрын
Thank you for this clear explanation. I appreciate it.
@kapilk1440 Жыл бұрын
Any idea about calling convention for Windows userland applications such as IE, Edge, Adobe Reader and Foxit Reader etc? Do they use CDECL, STDCALL or FASTCALL? 🤔
@skrmnghrd45206 ай бұрын
Hello People! and Matt! I can somewhat get around the ASM code and seeing how it works, but I cannot wrap my head around the passcode on the "variables-example" exercise. I tried RE-ing with the sourcecode and even tried printing the values of the results, but I still do not know what to input in the terminal as the keyword. Anyone have a tip for this?
@DemoList-hz8ht5 ай бұрын
i dont understand this line 52:53 64c: lea rcx,rax*4+0x0 65e: mov DWORD PTR [rcx+rax*1],edx why *4+0x0 and *1, can someone explain to me ? thank guys.
@TheMateusz5352 жыл бұрын
Hi, could you please provide any clue to loop-example-1? I know it has to be 15 char long, but I have no clue how to satisfy if statement only 8 times in order to to set local_10 to 8.
@ahmedadel33012 жыл бұрын
check the values at the ascii table
@drygordspellweaver8761 Жыл бұрын
Why did the global var have different address offsets?
@doublepositivezero83293 жыл бұрын
I'm sorry, paying to have what competitive edge?
@JNET_Reloaded4 жыл бұрын
I just uploaded a new linux related vid check out it and let me know what you think please!