How are you feeling about the GHIDRA release 2 months from now? It's apparently better than IDA.
@QuickishFM6 жыл бұрын
@@insidiousx6506 He means x86_64 which is often shortened to x64, so that's why there may be confusion
@zzco6 жыл бұрын
Also you kind of got your two audio clips too close to one another at 7:47
@johnrambo65496 жыл бұрын
Mr @LiveOverflow Are you gaay ?
@HCKDKU6 жыл бұрын
One and only channel on KZbin that uploads real hacking videos 😊
@HCKDKU6 жыл бұрын
@Batch Drav yeah I agree buddy 😀
@jex88856 жыл бұрын
@Batch Drav Sounds like you have some good recommendations, any other cool channels in the other categories you mentioned that I should also check out? :)
@jex88856 жыл бұрын
Batch Drav thx, I'll check them out 😊
@Jamown6 жыл бұрын
3 videos this week, we are honoured! Keep up the great work LiveOverflow :)
@GalaxyCatz6 жыл бұрын
Jamown his real name is Michael Stevens
@replaycoding6 жыл бұрын
I really appreciate the fact that you are doing this for free. It has helped me a lot when I was learning how to understand software. Thank You :)
@georgetroulis6 жыл бұрын
I'm a student that just got into embedded programming with STM32 less than a year ago and I LOVE THESE VIDEOS. They're very insightful and you make them such that they make anyone watching them curious to learn more. Thank you for making these, keep up the awesome work ♥️♥️
@AlanMedina3143 жыл бұрын
I like your videos because we get to see a different perspective of the arm architecture beyond basic coding.
@amirroohi45666 жыл бұрын
Why is ur voice so calming, I was doing some Italian homework and listening to the video, i do it all the time, doing some homework and listening to ur videos, nice stuff ;)
@quantumbracket69956 жыл бұрын
what I most love about this series is the intro animation
@PowerScissor6 жыл бұрын
I have zero idea what's going on in any of these videos, and have no plans to ever learn anything related to them. Yet, I watch them all...the whole videos...and love them. What's wrong with me?
@LiveOverflow6 жыл бұрын
Nothing! But it shows me that my videos can be entertaining regardless :3
@occamsrazor12856 жыл бұрын
1:21 Some, that may not know, may be interested to know why f00dbabe appears as beba0df0 in memory. This is called "endianess." When read from memory, into a register, it will be read as f00dbabe. Each byte, like f0 or be, is read straight forward, but the order of the bytes is written into memory backward. Hence: beba0df0. Endianess is an important concept in RE.
@RoiEXLab6 жыл бұрын
I really love this kind of videos because I'm interested in this topic, but I'd never be patient enough to waste my time dealing with hardware. I love software though
@wegi96216 жыл бұрын
Absolutly amazing bro ! Thanks for sharing.
@HorochovPL6 жыл бұрын
I'm about to dive into ARM (was sitting with AVR for a long time). Thank You for explaining how some stuff is managed after compiler does its job! Probably I won't need those informations, but it's nice to know.
@AxGxP5 жыл бұрын
Большое СПАСИБО!
@angelozinna96ct5 жыл бұрын
You are a god for me, pls keep going!
@osenseijedi6 жыл бұрын
IDA should sponsor you, bro. You made me want to buy a licence for my self
@hassansyed56616 жыл бұрын
On most of the secure systems JTAG is locked. I would like to see how you unlock a JTAG if it is locked in the firmware :-)
@GRBtutorials6 жыл бұрын
Decap the chip, cover the flash memory and erase the fuses using a UV lamp. Easy peasy lemon squeezy. JK, this is much easier said than done. You could also try glitching it as they did with the Switch's processor, bypassing the fuse checking. Also easier said than done.
@Spirit5326 жыл бұрын
@@GRBtutorials On secure devices, fuses are generally OTP, physically destroyed transistors, not flash with secure bits.
@GRBtutorials6 жыл бұрын
@@Spirit532 Well, yeah, now that I looked for it, it seems like STM32 have OTP memory (also known as PROM, programmable ROM, usually made out of antifuses) for JTAG lockout, so that leaves us with just three options: glitching, finding some kind of vulnerability in the fuse check, or some kind of extremely complex physical attack. The only scenario in which glitching or vulnerabilities in the fuse checking would be impossible to find would be if there was no fuse checking at all. If we were making a secure MCU with paranoid security, we could put JTAG (or other debug interface) handling code in OTP memory, and when locking it out, blow all the antifuses. Then the JTAG handling code would get converted to zeros or ones (which we could define as the opcode for NOP).
@Kudi100046 жыл бұрын
For the STM32F0 sub-series exist some known vulnerabilities: www.aisec.fraunhofer.de/en/FirmwareProtection.html
@hassansyed56616 жыл бұрын
@@GRBtutorials The only best solution is glitching. I would love to see someone sharing a video on Glitching ;) it's a very sensitive topic to discuss in public :)
@CharmanteEstPris6 жыл бұрын
Can't be clickbait if they don't understand the title. ¯\_(ツ)_/¯
@LiveOverflow6 жыл бұрын
as long as you understand the video it's fine!
@CharmanteEstPris6 жыл бұрын
@@LiveOverflow Ahaha, thanks! Great content once again. :)
@rhysperry1116 жыл бұрын
I both love and h8 the fact that this is spanned over multiple videos. It allows me to appreciate and understand your videos but I hate the w8!
@LiveOverflow6 жыл бұрын
I wish I know magic to create videos too!!!!
@metaorior6 жыл бұрын
thanks alot man this is very interesting
@2003vito6 жыл бұрын
never clicked on a video so fast without even reading the thumbnail or the title xd
@soorajjp18476 жыл бұрын
believe me ur great in hacking electronics. I'm an electronics engineer but don't know the most of the stuffs which u did.
@allegas16 жыл бұрын
Whoa, just in time! I dumped my segway kickscooter (f103 cpu) firmware using fake update, which read it all from inside out. More skilled guys assembled it back together, as first 1kb was smashed by dumper. Now i understand, that it was just a table and it how it can be recovered.
@avri2109846 жыл бұрын
I'm wondering what USB hub did you use and would you recommend it ? Thanks!
@derrickberg28256 жыл бұрын
@LiveOverFlow PLEASE MAKE A SERIES ON THE HACKERONE CTF! I'm stuck on a few levels and i've been going through all your videos for the 100th time trying to get some ideas. I think it's best if you just take a look at these CTF's!
@QuickishFM6 жыл бұрын
Nice video! Is it possible to change the BNE to a normal branch (or a JMP) to bypass the f00dbabe check, reupload to the chop, and then load custom firmware onto it?
@GRBtutorials6 жыл бұрын
Yes, but what's the point in doing that if you have physical access to the device? Might as well just load the custom firmware via JTAG from the beginning.
@QuickishFM6 жыл бұрын
@@GRBtutorials yeah that's a fair point. I'm guessing you'd have to manufacture a foodbabe firmware and then fake a loading page with APLU commands for it right? That's the only way I can think of without jtag access
@d3line6 жыл бұрын
QuickishFM yeah, but load via aplu checks that the signature of the new firmware is done with correct private key (hopefully securely stored by developers). If I understand it correctly.
@QuickishFM6 жыл бұрын
@@d3line Oh I see, makes more sense then
@emilyvavra21272 жыл бұрын
Very nice video, and thanks for sharing this. Also do you happen to know how I can load the aarch64 I have downloaded the packages from GitHub and there isn't any explanations on how to post ida to look into because overtime I try to patch and assemble it returns Sorry, this processor module doesn't support the assembler. Any help on that would be greatly appreciated. Thank you.
@Alexander-jm1oi6 жыл бұрын
Bro, we need advanced C tutorials. Something like what to do after you studied pointers, strings, structs. Maybe some libraries?
@malgailany6 жыл бұрын
In STM32 MCUs, the firmware developer can lock the firmware and will prevent others from accessing it with serial wire debug (SWD), or JTAG. I wonder why the firmware inside the Ledger wasn't locked and kept open?
@stdio.6 жыл бұрын
You mean ReadOutProtection? I got the same question here, cause most of the devices that I checked have enabled 'ReadOutProtection'.
@hamburglurgl6 жыл бұрын
Cool stuff
@gameglitcher3 жыл бұрын
Just rewatching this video and thinking about IDA, now I cant help but think if NSA knew about log4j when they released Ghidra.
@u0000-u2x6 жыл бұрын
Anyone have a suggestion to a free alternative to IDA for ARM reversing?
@u0000-u2x3 жыл бұрын
oh hey me from the past... turns out you found Ghidra and now rock at it ;)
@neoXXquick6 жыл бұрын
is it possible to get dumped firmware?
@oussamalarbi66376 жыл бұрын
best videos well explained and for dislikers they r haters
@milan82046 жыл бұрын
You need to make an collab with great scott
@thekakan6 жыл бұрын
I love Great Scott's channel. He makes things, and these guys hacks into them. I don't think that they'll get along well lol
@u0000-u2x6 жыл бұрын
how would we know who is talking? :P
@Vogel426 жыл бұрын
why use IDA 6.6 when IDA 7.0 is free?
@LiveOverflow6 жыл бұрын
Does that have arm? I dont even know. But I own 6.6 so I used that
@Vogel426 жыл бұрын
@@LiveOverflow sorry i thought it did, i just checked and found that IDA freeware version supports only 16 architectures and ARM is not one of them.
@zuhayr13376 жыл бұрын
Who else doesn't understand anything at all... Yet learns something....
@Kong_plays6 жыл бұрын
Nice
@moweME6 жыл бұрын
The ledger is just a huge CTF...
@Gunhed5076 жыл бұрын
Jese... one tease after another... :)
@jp2enАй бұрын
You've loaded the dump to the wrong address, right? )))
@xxkryaxx6 жыл бұрын
I understood absolutely nothing, but okay.
@blackdj296 жыл бұрын
me too, but looks pretty cool, isnt it? XD
@nasmRE6 жыл бұрын
RE > all
@TheVektast6 жыл бұрын
Resident Evil??? :D sure
@u0dgellxna6 жыл бұрын
@@TheVektast :Ffff
@nasmRE6 жыл бұрын
@@TheVektast ^^
@seanscon6 жыл бұрын
f00dbabe? what a strange name
@steefant6 жыл бұрын
Not really. They are often combinations of f00d, babe, cafe, b00b, c0de - basically anything that is representable in hex in 4 characters to combine it to a full 8-character/32b value. Java uses cafebabe as the first 4 bytes of .class files (cf. Java's logo). And there was this little story not too long ago: mjg59.dreamwidth.org/14955.html
@nihil_0x4 жыл бұрын
IDA Can't find entrypoint because of, its a raw binary! But how the f*ck the processor know where to execute from the program?
@Zooiest6 жыл бұрын
First like
@SciDOCMBC5 жыл бұрын
you have to be careful with all this zeros, there are rumors that some people have broken their tongue for this reason 😜😜😜
@rhysperry1116 жыл бұрын
I both love and h8 the fact that this is spanned over multiple videos. It allows me to appreciate and understand your videos but I hate the w8!