even if i didn't understand anything, all i could to say is that the humanity is still good that person like you still exist, thanks a lot
@rawallon8 ай бұрын
idk man, he's writing P*thon
@CX330Blake8 күн бұрын
@@rawallon lol python is good for such this work tho
@cyberpunk161810 ай бұрын
2:55 in and already 100% worth watching. Knowing I can use Ghidra without migraines is such a performance booster.
@n0o0b090lv10 ай бұрын
This ain't low level chanel this is high level chanel I learn a lot Also thx LLL
@basedfacistman10 ай бұрын
chanal
@n0o0b090lv10 ай бұрын
@@basedfacistman you see... FAST LOOK AN ALIEN Nah just a bird, oh look chanel. I wonder what happened
@vnc.t10 ай бұрын
*channel
@n0o0b090lv10 ай бұрын
@@vnc.t the n went on vacation
@ProfessorThock10 ай бұрын
LLL feels more Supreme than Chanel
@coffeegonewrong10 ай бұрын
Thanks for increasing the font size LLL 📱
@sarimbinwaseem10 ай бұрын
Whole thing went above my head but I still watched... Soon it will go in my head... IDK when
@iwakeupsad10 ай бұрын
Totally. So often for me, understanding comes through the side door unannounced.
@sarimbinwaseem10 ай бұрын
@@iwakeupsad haha.. yeah.. unexpectedly..
@EmberDRG10 ай бұрын
thank you for all these vids, they helped me with the basics of reverse engineering. I'm currently working on reverse engineering a ps3 game and it's been incredibly fun so far
@Pr0xima_audio6 ай бұрын
MGS4?
@EmberDRG6 ай бұрын
@@Pr0xima_audio NieR : Gestalt
@titaniumtomato724710 ай бұрын
8:40 I am not a fan when people make negative comments about someone's use of a tool to complete a task. Programming doesn't need more elitism or stupid battles.
@arjix873810 ай бұрын
I read your comment before watching that part and I totally got the wrong idea lol Thought you meant that no-code "hackers" should not be looked down upon. To which I disagree. But by "tool" you were referring to the choice of language, to which I agree, hacking is a mess either way, the choice of language should not matter as long as it does the job.
@Damqq10 ай бұрын
Honestly this is pretty interesting, I NEED MORE OF such content PLEASE.
@patriciopage657910 ай бұрын
How is it only now I find this gem of a channel? Dang youtube
@driden198710 ай бұрын
Looks like a lot of fun once you understand what's going on and know ways you could tackle the proble
@MyCodingDiary10 ай бұрын
I've never commented on a video before, but I had to for this one. It's that good!
@AgentXegy10 ай бұрын
bro I could watch this every day that was awesome
@luketurner31410 ай бұрын
For anyone here new to Python, if __ name __ == "__main__": main() prevents the main function from running when you import the file/script somewhere else. If you call a function after defining it without this check, it will run even if the file is imported, which you usually don't want Edit: had to insert spaces between the underscores and name because YT thought I wanted it italic. In actual code, it would be 2 underscores, name, 2 underscores (no spaces between); sometimes read as "dunder name" (concatenating/abbreviating "double underscore" to "dunder")
@IsaacNewTom2210 ай бұрын
Thank you, LLL, the font size saved me :)
@williamshenk7940Ай бұрын
excellent content!! enjoy your thorough analysis.
@EnderMega10 ай бұрын
Thats how you know he is a _real manly_ C/C++ programmer, he apologies for using Python, and as a fellow C/C++ programmer I forgive you. Jokes aside, good video!!!
@Kshsjhsjwgshdns10 ай бұрын
I love this channel.
@m1geo10 ай бұрын
Nicely done, Mr LLL.
@lazzalicious622010 ай бұрын
The man, The myth, The legend. Found you again
@driden198710 ай бұрын
Thanks for zooming in!
@MyCodingDiary10 ай бұрын
Great video! Very informative and well explained.
@boenrobot10 ай бұрын
14:37 - Hold up. Where did these magic hex numbers come from? Why those offsets? Can they be determined in a cleaner way, rather than hard coded like that?
@PauloMEDCOMADVANCE6 ай бұрын
Did you find out this part? also need help here!
@jakub26314 күн бұрын
3:50 thanks LLL!
@P-G-777 ай бұрын
Awesome work !
@zxcvb_bvcxz10 ай бұрын
So *why* does angr have issues with stdin and how were you able to work out the fix?
@Eugensson10 ай бұрын
Why - just speculating here, because cpp streams are weird. How - he has emulated the result of the text input himself, he put the string pointer on the stack (this is exactly what that cpp function does after fetching the text), and he has skipped the stdin function.
@mardiyonghasben16193 ай бұрын
Goodluck...sir... perfect
@Phreak5h0w3 ай бұрын
What keyboard are you using? I like that it's not a crappy loud mechanical keyboard, that even your neighbours could hear through three walls. Is it the same in your current videos?
@sassywoocooo10 ай бұрын
we finally got ghidra in dark mode
@yahsprut9 ай бұрын
what if the binary was built in something else like Rust for example? whould then Ghidra reverse engineer it to C or to Rust?
@BinToss._.5 ай бұрын
The decompilation target language doesn't matter. If you can compile source code to *native* bytecode, you can reverse it if you know the bytecode's target ISA (e.g. x86, x86_64, AMD64, various versions of ARM, et cetera). Some bytecode is *not* natively compiled such as WASM, CIL, and Java bytecode. C is preferable for decompilation because it normally has very little abstraction and is *almost* 1:1 with assembly language. C runtimes or compilers usually inject boilerplate for setup of heap memory management.
@HypeLobbiesHD8 ай бұрын
I love your merch, I have the mousepad and the t-shirt, do you have any other plans for more reverse engineering or low level related merch? I would totally buy more
@adershvarshnei519810 ай бұрын
thanks for increasing the size mr lll :)
@iagosrodrigues8 ай бұрын
I loved the video; I didn't understand anything, but it was an excellent video.
@baranjan696910 ай бұрын
Ngl I am pretty new to low level stuff but I recommend running it a bit first before even running strings
@ПавелСереда-н9д3 ай бұрын
would be great to see more complicated examples of using angr
@AgentKent10 ай бұрын
Thanks LLL
@dritterregenschirm232417 күн бұрын
1:46 How do you know that it's little-endian? Doesn't ARM support both?
@veritas701010 ай бұрын
Now crackmes are cool but whos gonna actually have good info on compiling osx/xnu kernel, modifying kernel/writing a kernel driver to disable debugging detection, bypass address randomization. What for? Oh yeah, just to bypass debug detection and also have a way to dump consistent traces. And just to begin on actually getting progress with 20mb+ binaries
@DropShotPat6 ай бұрын
I wasn't worried about the empty boxes, until you said something LOL.
@nedac2793 ай бұрын
Ik that’s it’s been a while, but thx LLL!
@braveitor10 ай бұрын
When machines take over us, I hope you speak for us all as you know their native language. Interesting to watch, don't hava a clue about how anyone can learn those skills... :D
@Armstrong178110 ай бұрын
you are the best
@dtikvxcdgjbv797510 ай бұрын
The magic starts at 15:44 😃
@IZ4HDM_Chris9 ай бұрын
Thanks for the Font LLL!!!!
@llmnr3xp0sed10 ай бұрын
I'm curious how angr works with ASLR enabled.
@nomio_o10 ай бұрын
When running with correct permissions you can choose to disable ASLR for a spawned process which is likely what angr does. GDB uses the "personality" syscall to do this with the flag ADDR_NO_RANDOMIZE.
@llmnr3xp0sed10 ай бұрын
@@nomio_o ah, good to know.
@logiciananimal10 ай бұрын
Angr looks really neat. I suppose in some cases one runs into formal undecidability. How does it "cheat'"?
@z8den10 ай бұрын
why on earth do you not have the link to the cracksme in the description man
@gringle857810 ай бұрын
Cool, next do Denuvo. Let's see how good you are!
@RandoYoutubeViewer10 ай бұрын
Hey , very nice intro to angr, i have a bit that i didn’t get is why the first try with the 32.8 bit key space reached in the simulator the last address ? That for me doesn’t yet click
@secret_702510 ай бұрын
Low level programming is the hardest my bro ReSearch about it.
@saulgoodman67109 ай бұрын
Great video, I'm new to this stuff. couple of doubts, when giving the address of the good and avoid case, why is only 4byte address is provided instead of entire address from memory map? secondly, how the hell do you learn all there stuff? since there are multiple libraries/tools.concepts used just for one problem. Impressive btw!
@makebreakrepeat10 ай бұрын
Dark mode, let's go!
@cherubin7th10 ай бұрын
I am looking forward, when we can take a binary and automatically turn it with AI in beautiful source code with comments etc.
@monterraythehomeless5 ай бұрын
I needed the font size increase and I'm on desktop lol. Thanks LLL
@smocloud10 ай бұрын
Thanks LLL.
@Vazzible_gaming6 ай бұрын
How do i find the CTF program, can you link it to me so I can do all the steps myself?
@mattshuАй бұрын
THANKS LLL
@hakushakudoa2838 ай бұрын
Thanks triple o
@outtakontroll333410 ай бұрын
this is some dark art shit- only able to follow a little of it, but interesting
@oliverpasquesi80686 ай бұрын
Can you do a Ghidra tutorial pls?
@Ni7ram10 ай бұрын
yes, yes.. of course i understand all this
@asseenontv24710 ай бұрын
Do you have any recommendations on books that are useful desk references for this stuff?
@catatrophicalist10 ай бұрын
do you prefer intel or at&t syntax?
@grandmakisses997310 ай бұрын
intel of course
@godnyx11710 ай бұрын
@@grandmakisses9973 Based opinion
@atijohn813510 ай бұрын
intel addressing syntax and at&t argument order ("mov rax (to) rcx" makes more sense than "mov (to) rcx: rax")
@godnyx11710 ай бұрын
@@atijohn8135 The thing is, binary instructions follow the intel syntax. So, especially for those who create compilers, the AT&T syntax is confusing, even tho it makes more sense...
@flyinginthedark618810 ай бұрын
AArch64
@terry-8 ай бұрын
Great!
@dtikvxcdgjbv797510 ай бұрын
You unbaked the bread!
@Subcode10 ай бұрын
Can you make a video on how this would work when an application also has a DLL etc? ive tried this once on an application with a DLL and it got very confusing, really couldnt figure any of it out.
@PauloMEDCOMADVANCE6 ай бұрын
why the -0x58? where does it come from?
@GameBacardi10 ай бұрын
...I need practise "hello world!" again, 60th time
@abauchu9 ай бұрын
Thanks LLL
@Codingwannabe-cw1yd10 ай бұрын
Thx lll for zooming in
@shteatinggrin10 ай бұрын
It’s so weird knowing that the NSA has a program named after the Godzilla monster
@comradepeter8710 ай бұрын
Remember that it's still nerds inside NSA that are responsible for creating and maintaining this. If they can get away with it, they will.
@shteatinggrin10 ай бұрын
@@comradepeter87 Ofc, every major tech system has been built up and maintained by nerds. It’s still pretty wild regardless
@RigoVids9 ай бұрын
Thanks tripple el
@RandomGeometryDashStuff10 ай бұрын
do you use computer with arm cpu?
@hyperplano10 ай бұрын
Waiting for LLL x LaurieWired video :)
@JM-is1vf10 ай бұрын
Thanks for your channel. I would love it even more without the background music.
@monad_tcp10 ай бұрын
Is scanf still using self modifying code or something ?
@maz52328 ай бұрын
Hi please make more
@RJ-or8bw6 ай бұрын
Thanks LLL
@nsg65010 ай бұрын
Wait are you a cuber as well?
@VINICIUSMOURACARDOSO8 ай бұрын
how can I change ghidra to dark mode?
@quietusplus12216 ай бұрын
I have some experience with coding. The further this went on my head started spinning though. This is on another level, quite interesting ^^
@vsevolodalipov437510 ай бұрын
May be a dumb question, but why not brute force it instead?
@kamu385 ай бұрын
If you can do this technique then it's far superior to brute forcing. Brute force would take far longer.
@ErikBongers10 ай бұрын
Can you crack how to exit vim?
@DrDAC-go7hs2 ай бұрын
Thx 3xL
@hoteny10 ай бұрын
cool. now how do i guess what a weird 8 byte value does?
@semitangent10 ай бұрын
Thanks triple L - in the chat!
@rudymoralesjr7 ай бұрын
I need to learn how to do this proficiently so I can hack car ECUs for tuning. They made it so hard to tune cars these days...
@ffeliziani10 ай бұрын
Wait, how are you running arm code on your machine?
@tronosgamingwizard10 ай бұрын
perhaps a VM
@ffeliziani10 ай бұрын
@@tronosgamingwizard does ghidra run on ARM? I guess with the magic of editing (or ssh) he could be on different machines
@tronosgamingwizard10 ай бұрын
@@ffeliziani I'm unable to answer this one, mate.
@ffeliziani10 ай бұрын
Sorry yeah the Q should have been for @lowlevellearning
@kamu385 ай бұрын
@@ffeliziani It's Java. So if the JVM runs on ARM then it will (more/less) run.
@UnrealEngine_Master10 ай бұрын
nothing is clear, but very interesting 🤠
@rallokkcaz10 ай бұрын
LFG!!!! LLG GANG GANG!
@SadKris10 ай бұрын
the a/v desync lmao
@blehbleh928310 ай бұрын
Symbolic Execution 🔥🔥
@MenkoDany10 ай бұрын
There's a piece of abandoned niche commercial software which I'd love to crack for archival purposes. Will this work on it? It's written in Delphi and it can be activated offline even though there was an internet activation option (which obviously doesn't work anymore). There is version 3.x which is still being sold even though there were no updates for 8 years or any activity from the dev whatsoever. Thing is, version 3.x is a joke. Well, 2.x was an actual joke, not worth a penny, and 1.x is the legendary version which I'd like to crack. I believe it would still be used today if the dev released a 64bit version like he promised :( The released version crashes way too often because of the ram limitation.
@a_f_a_b10 ай бұрын
Man you don't have to apologize for python. You don't have to apologize for anything!^_^
@katchen262610 ай бұрын
what does SAT mean?
@LowLevelTV10 ай бұрын
satisfiability solver
@almightyhydra10 ай бұрын
Meh, automating the reverse engineering takes the fun out of the problem :p if each of those functions was only checking one of the bytes, you could solve each fairly simply, I'd imagine.
@danielrubin364910 ай бұрын
Tack 3xL
@wrathofainz10 ай бұрын
Someone should write an ANGR-y UI for gui people
@yurilsaps7 ай бұрын
I didn’t like that was necessary to use angr to solve the challenge