Liked that one, since it is an easy example of how to disassemble code and make sense of what is readable. Perfect as a beginner tutorial.
@sk0r Жыл бұрын
I’ll be honest, a lot of your videos I have no idea what you are doing, but I enjoy watching you and your skill set and what is possible with the right tools. 🙏
@deltabytes2 жыл бұрын
I like the way you take us through step by step. I am learning a lot from these videos.
@arr3business939 Жыл бұрын
same
@MikeDSutton2 жыл бұрын
In case anyone else was curious what the 'unscramble_flag' function did, here's the rough equivelent in Python 3: bytes([ b + (0x2F if b < 0x50 else -0x2F) for b in bytes([ 0x41, 0x3a, 0x34, 0x40, 0x72, 0x25, 0x75, 0x4c, 0x34, 0x46, 0x66, 0x30, 0x66, 0x39, 0x62, 0x30, 0x33, 0x3d, 0x5f, 0x63, 0x66, 0x30, 0x62, 0x65, 0x35, 0x35, 0x62, 0x60, 0x65, 0x32, 0x4e ]) ])
@Lampe2020 Жыл бұрын
I first saw the code then the description you gave but I immediately recognized it as Python3-code because two of my last three Python3-projects involved exactly that, converting lists of numbers between 0x00 and 0xff to byte strings (`bytes` object) XD
@WorldAquariumSingaporeАй бұрын
super and i am 2 years late watching your vid
@The_Scene8264 ай бұрын
Great video! Your walkthrough on using Ghidra for reverse engineering was incredibly helpful. I was able to solve a CTF challenge and find the flag thanks to your detailed instructions. Keep up the excellent work!
@tpai3022 жыл бұрын
I'm so bad at RE but love watching others do it so I can pick up on little things each time.
@jackscalibur8 ай бұрын
Hey! Do you feel like you're better at it now?
@domzzy64323 ай бұрын
Are you good at it now?
@11ph22il2 жыл бұрын
These videos are the spam I like to get, each one with GREAT info on CTFs. Thanks John!
@Riiveri2 жыл бұрын
I have no idea why KZbin decided to recommend me these videos but I'm glad it did. This is awesome!
@vivarantx2 жыл бұрын
same here, I was watching people eating 30 bags of cheetos and I ended up here
@kiizuha Жыл бұрын
@@vivarantx lmao
@kadericketts92182 жыл бұрын
Been loving the PICO CTF videos you’ve been making have watch most of them and have been learning a lot as i am just a noob in IT
@kevinalexander49592 жыл бұрын
Would love to see a video on rebasing. I have a hard time with alignment using strings. Would love a newbie friendly of you rebasing binaries that do not align in disassembler. thanks!!
@HyBlock2 жыл бұрын
couldn't this be done in some other way, my feed is filled with all those uploads making it harder to browse, don't wanna unsubscribe cus I appreciate your work though!
@TheJustinist2 жыл бұрын
Yep, unsubbed
@KoskiK2 жыл бұрын
Quite the same, after the first burst of videos I figured it was just a mistake or an error with the scheduler. After this new one I unsubbed unfortunately, as I enjoyed the content. KZbin should by now have made a limit, say 3 posts of a single person in the sub feed.
@ocoolwow2 жыл бұрын
@@KoskiK ah that would actually assume that KZbin would output usable work
@zdrasbuytye Жыл бұрын
You can do reverse engineering with the Linux shell only .
@FakeMichau2 жыл бұрын
KZbin after seeing so many uploads: i'm gonna end this man's whole career
@kr4k3nn2 жыл бұрын
This is my first time seeing Reverse Engineering. I am like WOW, this is so fun to watch & do. THanks John for introducing this very interesting things to us. :)
@Dex_Lulz Жыл бұрын
The more spend I time on your channel the more I learn.
@DevBranch Жыл бұрын
Thank you for making these videos! I'm new to this, so being able to see how this works first-hand is extremely helpful.
@HYPR.trophy2 жыл бұрын
I appreciate hearing your thought process as you go through the challenge
@hardelectrolove2 жыл бұрын
Did you just accidentally release every video for the next weeks/months at once? Holy moly, that's a lot of stuff in my Watch Later playlist now! x)
@VA3KAMA32 жыл бұрын
same. just have had a marathon watching them
@theamazingjay1612 жыл бұрын
Okay, so I'm not the only one.
@cod4volume2 жыл бұрын
As far as open source content goes, John, you’re an OG. A goat. Appreciate the content and knowledge dude, stay humble.
@1234enzor Жыл бұрын
A flashback and relearning TY!
@claytonautoshmotive3 күн бұрын
First of all, you're incredibly talented and even though I only comprehend bytes here and there its always interesting to follow along. My limited experience in reversing all took place in Olly x64/32 and recently hit a wall with some software for an automotive interface i paid good money for several years ago.. the mfgr ended support for it so theyre no longer supplying the updated "launcher" software that basically hijacks the proprietary diagnostic platform for the Blue Oval. The magic happens during the app startup process as long as the interface is connected to the car and the laptop via prolific serial over usb cable. Im not sure how to get olly to follow this process since the launcher software only exists to launch the official application without those pesky license requirements. I really just want to edit the last launcher update i got to get it to load the newer version of the main application. serval sources have figured it out and charge for their Re-Hack of the Hacked app and i would rather make the adjustments myself if i can just get started in the right direction. long winded sorry, its a simple (ish) app thats strangely hard to describe in a short and sweet mannor lol. how can i get a good breakdown of what its doing? TIA
@P-G-77 Жыл бұрын
Love this intricate logic tricks.
@ThomasAbraham-s6v7 ай бұрын
Man u r DANGEROUS! lol 🙃☺ keep ur great work up dude! 💪
@sem8973 Жыл бұрын
This would have been a perfect intro tutorial to reverse engineering with Ghidra
@DanjumaMuhammad Жыл бұрын
I like the term "low-hanging fruit 🍓" 😊
@iamtimsson9 ай бұрын
oh look a user agreement, "i agree" never to be thought of again
@lancemarchetti86732 жыл бұрын
Hi John, can you please review "angr" for us. I don't have a clue where to start...lol
@yttos73582 жыл бұрын
Another way of converting from hex to decimal is with the `printf` command which can be found on any linux system; use `printf %d 0xc0ffee` to see
@inazumaeleven91022 жыл бұрын
I like the fact that in each ctf videos, I learn new tools to use for hacking. Now I check the bell icon. Keep on going man, u the best
@ronorocky2 жыл бұрын
i just love you man,you are just awesome....... hope someday i will meet u in person.... u r doing a great job... keep it up. ❤️❤️
@SamoCoder2 жыл бұрын
This was interesting. Liked and subscribed.
@WayneModz Жыл бұрын
I guess its kinda good you didn't have the environment requirements preinstalled
@makayjozsef2 жыл бұрын
You can use "apt search" too for package searching
@lancemarchetti86732 жыл бұрын
agreed
@aurelienlevra37827 ай бұрын
Great video
@for14556 Жыл бұрын
Very nice video about rev, thx.
@znucii2 жыл бұрын
MAHYOUB WE MISS YOU
@hvacinstalacije1985Күн бұрын
Can you decode and file from ECU which usually .bin file, how we will be able to find the maps for tuning for new ECU
@KGAD08312 жыл бұрын
I really liked this one.
@SpencerNold Жыл бұрын
Headless for Java means its stripped of mouse and keyboard input libraries and whatnot. Badly breaks java swing, so you probably don't want to use that.
@Lampe2020 Жыл бұрын
The word "Bbbbbbbloat" is a bloated word and has the same effect as a mass of bloatware has on a PC: it works, but slower.
@hh7xf2 жыл бұрын
you should also check out cutter
@mytechnotalent2 жыл бұрын
Love me some Ghidra!
@victorkuria47342 жыл бұрын
Great stuff
@ancestrall7946 ай бұрын
Awesome bro
@m4rt_2 жыл бұрын
<a href="#" class="seekto" data-time="380">6:20</a> (sdkman is a good tool for downloading java stuff)
@ashokshastri9101 Жыл бұрын
Sir big fan of yours from Lamatol village, golbazar-06 municipality, siraha district, sagarmatha zone, Madhesh Pradhesh (province no 2), nepal 🇳🇵
@TheofilosMouratidis2 жыл бұрын
at <a href="#" class="seekto" data-time="806">13:26</a> you already got the decimal by hovering over the number
@MrLetsGamePlayHD2 жыл бұрын
In ghidra you can also change the display type
@bkib Жыл бұрын
Nice!
@heisenberg8055 Жыл бұрын
TF I just watched! Interesting
@codedsprit Жыл бұрын
I wish I had a nice laptop like yours 🥺
@krishanuchhabra2 жыл бұрын
Nice one
@abiodun68972 жыл бұрын
i got it 🙋🏾♂️. where can i learn this reverse engineering
@superfish46032 жыл бұрын
There are 11 hidden videos in the playlist, when do we get them? :)
@msalih2 жыл бұрын
Awesome
@gogogg912 жыл бұрын
Awesome!
@tech-wandeveloper74952 жыл бұрын
That was cool man!
@skeeberk.h.43962 жыл бұрын
Very Nice
@tlocto2 жыл бұрын
can't wait till you go over noted, was my favorite one
@untitled80272 жыл бұрын
nice
@wonderweissmargela42612 жыл бұрын
Easy with the upload sir
@Itsmeattacker2 жыл бұрын
hello sir your videos are great it helped me for solving and understanding all the ctfs of thm
@MisterK-YT2 жыл бұрын
John can you post the code that formats your bash (or zsh) prompt? From your .bashrc or wtvr config file. I like that two-line prompt.
@Mathcartney2 жыл бұрын
Its zsh the shell that he uses, it isn’t bash. And the theme is the default kali theme. There are many other custom themes and wrappers such as powerlevel10k if you dig it deeper tho
@cryproot98452 жыл бұрын
It's a good video
@polinimalossi84042 жыл бұрын
but you can make the same video with the imusic aimersoft program?
@leblanc6666662 жыл бұрын
nice and simple, but fun nonetheless! Does picoCTF have have challenges that are more based on web applications?
@iKilleasy0072 жыл бұрын
picoCTF has a web exploitation category
@MygenteTV2 жыл бұрын
wtf, this is weird I had been watching your videos and even follow you in LinkedIn for years and just found out I wasn't subscribed to your channel. KZbin be playing tricks, they welcome you with your favorite channel for ever and you will never know you weren't subscribed because everytime you open youtube and see the same person there you automatically think you are subscribed
@pitust2 жыл бұрын
process or RE with binary ninja: step 1: load the binary. step 2: see the number in plain text from the decompiler. step 3: profit
@Bromon6557 ай бұрын
What is the Linux wizardry… dude was flying through the terminal like nobody’s business
@2b2tJourney2 жыл бұрын
Wait this is intresting
@wahabwahab20422 жыл бұрын
im watching your video and honestly i'm 80% didn't understand what are you doing exactly. i wonder what level is that ? im sure it is advanced level . where to start to achieve your level ??
@noodlechan_ Жыл бұрын
what if we reverse engineer Ghidra binarys using GHidra?
@Bowzerbro2 жыл бұрын
👍
@saranvishva79825 ай бұрын
what will happen if I swap the iF and else condition
@tribblewing6 ай бұрын
My etc/apt/sources.list is using Kali Linux's default repo, but I can only install strace. ltrace keeps getting an error: "Unable to locate package". Has anyone figured out a working alternative repo?
@passaronegro3492 жыл бұрын
...would it be possible to have subtitles in Portuguese ???
@mideno76192 жыл бұрын
Sup
@JessicaMerry-f1i Жыл бұрын
Please 🙏 sir can I use this to do reverse engineering on my mobile app??? Can someone help me out
@mikerich50032 жыл бұрын
Has anyone on bohemia has their initial deposit asst changed..
@aaravinthan00122 күн бұрын
Bro it is possible to convert intel hex to c code using this
@AliYar-Khan2 жыл бұрын
Can we reverse engineer malware and then remove them this way ?
@bmbiz2 жыл бұрын
That's pretty much the _only_ way to remove previously unknown malware: reverse engineer it, figure out all changes it makes and then undo all those changes on an infected system.
@SultanSaadat2 жыл бұрын
can you send us your shell modifications? This looks so cool.
@ocoolwow2 жыл бұрын
You gotta stop man, this is flooding my sub box
@vinnie32659 ай бұрын
Everytime I Try to run a binary file on my kali linux I am getting exec format error...so I am not able to solve any rev engineering problems....can someone plss help with it🙏🙏🙏🙏
@WaseemLaghari Жыл бұрын
I solve it by viewing your video but you did it late by looking for other stuffs. Maybe you do to let us all understand everything
@utensilapparatus86922 жыл бұрын
John 1337 the king
@metsfaninct2 жыл бұрын
Man, nothing like getting spammed. Should have spaced it out.
@ultimultig2 жыл бұрын
cool but i didn't understand a single word said in this video
@MisterK-YT2 жыл бұрын
Question: why didn’t he “trust” the Ghidra from the official Kali repo? Why go through the process of installing manually??
@SheIITear2 жыл бұрын
Stuff from the repos on your distro tend/might be really old. In case of ghidra you just download and extract it so thats the fastest way to get the latest.
@MisterK-YT2 жыл бұрын
@@SheIITear noted! Thanks!
@vaisakh_km2 жыл бұрын
I wanted to ask same. I thought it might be the reason but to make sure... Is that a problem with distros like fedora or arch!?... those are more up to date than Debi an right!?
@roachxyz2 жыл бұрын
What is this stuff called? Cybersecurity?
@NexushasTaken Жыл бұрын
its already in the video title.
@marcoamendoza5283 Жыл бұрын
Does anyone have the bbbblob file to try it out?
@KirwinWebb2 жыл бұрын
You seemed disappointed that you got the flag so quickly.
@patrickborys34902 жыл бұрын
ez
@MasterRg-cj7tt2 жыл бұрын
Hi , I am new PicoCTF . and i try to solve that for practice if i cant i am looking for in google for solving . But I cant find picoCTF notepad Author: ginkoid . Can you help me? How can i solve that
@afrkleaks4991 Жыл бұрын
I do not have time with all these load it opens this read there and there then crack it i refuse all these stuff at the end you have to find the way to get in to the software, easy ways quickly just load malware to infect
@BigWin244102 жыл бұрын
Is this the apparently kid all grown up?
@anujsrivastav64442 жыл бұрын
Hey jhon can you please tell me how I can trace the memory leak from heapdump file?
@CodyHoskin2 жыл бұрын
Have you ever got a live virus on your own system? Or a RAT?