HackadayU: Reverse Engineering with Ghidra Class 2

  Рет қаралды 55,088

HACKADAY

HACKADAY

Күн бұрын

Пікірлер: 20
@hackaday
@hackaday 4 жыл бұрын
Hi everyone! I hope that you enjoy the content we put together for these videos. If you have questions, feel free to reach out to the Instructor on twitter twitter.com/wrongbaud. All of the course details can be found here: hackaday.io/project/172292-introduction-to-reverse-engineering-with-ghidra
@suniliyengar8653
@suniliyengar8653 2 жыл бұрын
This class series is the best I have seen so far. I am so impressed by the clarity of the explanation. This course just made me enjoy learning so much! Thank you, you are the best teacher.
@Mishanya00
@Mishanya00 11 ай бұрын
Thanks, you have a very good lesson series of Ghidra
@ITOzann
@ITOzann 4 жыл бұрын
Thank you for the content!
@redpillcommando
@redpillcommando 4 жыл бұрын
Thank you for this video.
@Yocairo
@Yocairo 3 жыл бұрын
Good course material, thanks!
@RevUntoMan
@RevUntoMan 3 жыл бұрын
This course is great! I'm learning a lot! Does anyone have a walkthrough for solving /variables-example ?
@ahmedadel3301
@ahmedadel3301 2 жыл бұрын
If you did it, could you share the solution?!
@RussellTeapot
@RussellTeapot 6 ай бұрын
@@ahmedadel3301 I assume you moved on by now :D but for everyone that's stuck, I cheated a bit: I just wrote a C program that prints the correct characters applying the operations found in the decompiled pseudocode provided by Ghidra. Pay attention to the global variables involved ;) I wont disclose anything else tho, good luck :)
@ivanrubalcava7109
@ivanrubalcava7109 Жыл бұрын
Thank you very helpful!👍
@baruchben-david4196
@baruchben-david4196 3 жыл бұрын
Thank you for this clear explanation. I appreciate it.
@kapilk1440
@kapilk1440 Жыл бұрын
Any idea about calling convention for Windows userland applications such as IE, Edge, Adobe Reader and Foxit Reader etc? Do they use CDECL, STDCALL or FASTCALL? 🤔
@skrmnghrd4520
@skrmnghrd4520 6 ай бұрын
Hello People! and Matt! I can somewhat get around the ASM code and seeing how it works, but I cannot wrap my head around the passcode on the "variables-example" exercise. I tried RE-ing with the sourcecode and even tried printing the values of the results, but I still do not know what to input in the terminal as the keyword. Anyone have a tip for this?
@DemoList-hz8ht
@DemoList-hz8ht 5 ай бұрын
i dont understand this line 52:53 64c: lea rcx,rax*4+0x0 65e: mov DWORD PTR [rcx+rax*1],edx why *4+0x0 and *1, can someone explain to me ? thank guys.
@TheMateusz535
@TheMateusz535 2 жыл бұрын
Hi, could you please provide any clue to loop-example-1? I know it has to be 15 char long, but I have no clue how to satisfy if statement only 8 times in order to to set local_10 to 8.
@ahmedadel3301
@ahmedadel3301 2 жыл бұрын
check the values at the ascii table
@drygordspellweaver8761
@drygordspellweaver8761 Жыл бұрын
Why did the global var have different address offsets?
@doublepositivezero8329
@doublepositivezero8329 3 жыл бұрын
I'm sorry, paying to have what competitive edge?
@JNET_Reloaded
@JNET_Reloaded 4 жыл бұрын
I just uploaded a new linux related vid check out it and let me know what you think please!
@xdonvito
@xdonvito 2 жыл бұрын
Death by PowerPoint
HackadayU: Reverse Engineering with Ghidra Class 3
1:00:39
HACKADAY
Рет қаралды 26 М.
HackadayU: Reverse Engineering with Ghidra Class 1
1:05:06
HACKADAY
Рет қаралды 228 М.
버블티로 부자 구별하는법4
00:11
진영민yeongmin
Рет қаралды 20 МЛН
What's in the clown's bag? #clown #angel #bunnypolice
00:19
超人夫妇
Рет қаралды 14 МЛН
Officer Rabbit is so bad. He made Luffy deaf. #funny #supersiblings #comedy
00:18
Funny superhero siblings
Рет қаралды 19 МЛН
Don't look down on anyone#devil  #lilith  #funny  #shorts
00:12
Devil Lilith
Рет қаралды 46 МЛН
Just enough assembly to blow your mind
29:31
Kay Lack
Рет қаралды 102 М.
Programming with Math | The Lambda Calculus
21:48
Eyesomorphic
Рет қаралды 212 М.
Reverse Engineering Malware with Ghidra
1:13:43
Off By One Security
Рет қаралды 6 М.
An introduction to hacking video games with Ghidra
39:39
Hilltop
Рет қаралды 24 М.
How are holograms possible? | Optics puzzles 5
46:24
3Blue1Brown
Рет қаралды 1 МЛН
The Only Unbreakable Law
53:25
Molly Rocket
Рет қаралды 332 М.
Ghidra Scripting to Speed Up Reverse Engineering
17:24
LaurieWired
Рет қаралды 19 М.
Faster than Rust and C++: the PERFECT hash table
33:52
strager
Рет қаралды 587 М.
버블티로 부자 구별하는법4
00:11
진영민yeongmin
Рет қаралды 20 МЛН