Big thank you to Brilliant for sponsoring this video! To try Brilliant for free (for 30 days) and to get a 20% discount, visit: Brilliant.org/davidbombal // KZbin video REFERENCE // Free Exploit development training (beginner and advanced) kzbin.info/www/bejne/gojQqmaqbZl0f9E Buffer Overflow Hacking Tutorial (Bypass Passwords): kzbin.info/www/bejne/mWOlp4Zoi9Z3jck // Stephen's Social // X: x.com/Steph3nSims KZbin: www.youtube.com/@OffByOneSecurity // Stephen RECOMMENDS // Disassemblers: Binary Ninja: binary.ninja/ IDA Pro: hex-rays.com/products/%20ida/ Ghidra: ghidra-sre.org/ Free Learning Resources: An Intro to C for Windows Dev: www.sans.org/webcasts/intro-c-windows-devs/ Books Gray Hat Hacking Series by various authors: US amzn.to/3B1FeIK UK amzn.to/3A920AL The IDA Pro Book, 2nd Edition: The Unofficial Guide to the World's Most Popular Disassembler Second Edition by Chris Eagle US amzn.to/3Yv3srw UK amzn.to/3Wtz8e6 // David's SOCIAL // Discord: discord.com/invite/usKSyzb X: www.x.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal KZbin: www.youtube.com/@davidbombal // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 00:00 - Intro 01:06 - Brilliant sponsored segment 02:36 - Stephen Sims // Off By One Security KZbin channel 04:02 - Hello World 06:11 - Learning the C programming language 09:34 - Introduction to reverse engineering 13:57 - Functions explained 16:43 - Stripped explained 18:03 - Disassemble explained // Differences between flavors 25:11 - History behind the two flavors 25:58 - Disassemble explained continued 26:22 - Return oriented programming explained 27:14 - Reverse engineering demo 01:07:46 - IDA Pro Demo 01:16:42 - Conclusion Disclaimer: This video is for educational purposes only. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #android #ios #hacker
@meredithunit4 ай бұрын
This is probably one of my favorite videos I’ve seen this year. It does go deeper than others, but if you’re interested in this, if you’re interested in malware analysis and reverse engineering, this is a powerful primer
@rojansapkotaofficial4 ай бұрын
Everyone's "Hello World" is the gateway drug to programming.
@davidbombal4 ай бұрын
😂
@SpinyDisk4 ай бұрын
„gateway drug to programming“. Where have I heard that? ;) (For anyone wondering I think the comment is mentioning fireship.)
@savagepro90604 ай бұрын
@@atlantic_love it's a drug, therefore abused, not over-used
@dean61254 ай бұрын
It was originally (if your old 😆) 10 print "hello world" 20 goto 10
@Cnkswofkwodoxk4 ай бұрын
@@davidbombal Bro can you make a video on how to extract vuln websites plz bombal sir ❤
@Wired_And_Grounded4 ай бұрын
Amazing how smart and how passionate he is, I have no idea what he was talking about half the time but I tried to lol. Great content as always David
@davidbombal4 ай бұрын
We can all learn so much from Stephen! Look at the free C course he mentioned (linked in the video description).
@Wired_And_Grounded4 ай бұрын
@@davidbombalThank you! I love your channel and videos, it’s honestly what inspires me to continue down the path of cyber security. I was also wondering about MOK management, Platform Keys, KeK Keys, etc (for UEFI bios) and TPM(secure boot) and what vulnerabilities this could prevent or even not prevent.
@mbazzouz4 ай бұрын
A good reference for folks who like to learn from a book is Practical Binary Analysis (no starch press) - it does require familiarity with C and assembly.
@dadgeman824 ай бұрын
I'm going to watch this one twice. This guy is a great teacher.
@SoundsLikeOdie4 ай бұрын
I remember doing assembler language for the intel 80386 30 years ago. We had a colourful IDE all the registers were neatly displayed. It was much easier to follow then purely a text based solution. I remember stepping through my code and connecting directly to the hardware. Ridiculously fast executions.
@xanaxity3 ай бұрын
Smart guests, smart host, smart community makes davidbambal the legendary youtuber for not only who starting out but for intermediate and pros as well.
@irrationalywise4 ай бұрын
It's great quick overview of the underlying basic principles of Reverse Engineering. Thank you for this amazing content, that too for Free!. It really helps.
@CedroCron4 ай бұрын
Way over my head, but I enjoyed it anyway. Thanks David!
@OiiBruv.o74 ай бұрын
yeah i'm so lost lmao, glad i'm not the only one
@TheTubejunky4 ай бұрын
It's only over your head if you are short minded......😅
@aliabbas483 ай бұрын
Love to see some real deep tech videos from your channel David!
@CyberDevilSec4 ай бұрын
Oh my god! Welcome back!! I remember you i thought your last interview was SO COOL with David! I can't wait to watch this episode.
@BrianAHarkins4 ай бұрын
Was just looking into this topic. The timing couldn’t be better. Thanks! 🎉
@iMshadab3 күн бұрын
Please do more of these "complex" videos with Stephen Sims. He is amazing!
@danushkastanley17464 ай бұрын
Oh my goodness! the amount of excitement I got when I saw the video
@davidbombal4 ай бұрын
So happy to hear that! 😀
@mytechnotalent4 ай бұрын
Great video and tutorial as RE is so critical. Thank you both!
@davidbombal4 ай бұрын
You're welcome! I hope you enjoy the video!
@NatteeSetobol4 ай бұрын
There's a lot of "easy stuff" I haven't learned, so I don't mind if you cover the "easy" stuff because I still might learn something new! Steven is great, I watched every thing on his channel and learned a lot!
@kaylarose99854 ай бұрын
Thank you for putting out great content David. Thank you as well Stephen!
@davidbombal4 ай бұрын
Thank you. I hope you learn something new 😀
@CyberDevilSec4 ай бұрын
I was already subbed since last episode! And i read your book YEARS ago ^^ Huge fan Stephen!
@alfatech86044 ай бұрын
Thanks to all of you for this video I got better explanations. I want to learn advance things but most of the courses are expensive and trying to figure things out the hard way, since I am not following a well-known path.
@TomCarbon3 ай бұрын
@31:19, if x/s $rip+0xec4 doesn’t work, it’s because you also need to add the 7 bytes taken by the instruction, 0x…5ffd + 7 = 0x…6004
@YLprime4 ай бұрын
Reverse engineering is really not for beginners. You need C, x86 asm, windows internals, system programming, know a dynamic debugging tool such as x64dbg, a static debugging tool like ghidra and hours of crackmes.
@a01A013 ай бұрын
yep it's hard but with song called omfg hello 😂 it fun am all in
@zangin3 ай бұрын
this is great for somebody who’s a programmer but never went this deep into it. i love it. its a great video for self teaching if you have a basic understanding of what’s going on
@bgmieditscy2 ай бұрын
Have you tried reverse engineering?
@Rahul-jhunnulalАй бұрын
I know python its possible 😢
@MangyPL29 күн бұрын
and a lot of intelligence.
@Mastertvt9134 ай бұрын
This was fun, i cant fathom how good stephen courses are he is great at what he does
@TheTubejunky4 ай бұрын
Pro tip: videos with sample code in them di much better because many can follow along and take oridw in ACTUALLY creating something to show off. Great video
@camelotenglishtuition63944 ай бұрын
Absolutely love him. His channel is excellent too!
@aounhaider83354 ай бұрын
Keep sharing such amazing tutorials!!
@fslurrehman4 ай бұрын
1. Patching a DLL: How can I patch a DLL used by a Windows program so that when a function in the DLL is called, it logs a message to a file saying "I am called" and also logs the data in variables or the stack? 2. IDC Scripting: Can you help me write an IDC script for IDA Pro, or a similar script in Ghidra, that logs the functions being called, their addresses, the stack variables, and which part of the data file is being used when I run the program between two breakpoints? 3. How can I find out how a program reads an encrypted or obfuscated file and converts its content? Also, what are `bcrypt.dll` and `bcryptprimitives.dll` used for and how to use them?
@shasikiran21514 ай бұрын
David talks!!! Cyber Rocks!!!😎😎😎
@davidbombal4 ай бұрын
Thank you
@bbowling6194 ай бұрын
When i listen to this level of knowledge it reminds me of watching John Hammond reverse engineering videos. My brain literally brakes and pukes on itself, but once i listen to it again and i keep improving, i eventually get 0% of it. lol just kidding but also not kidding !! Please keep them coming. OTW is fun as well. Keep it fun @david. Good stuff !!
@mohamedabozaid21474 ай бұрын
Hello sir, this video is really great it gives a good idea about basics and how everything is going in reversing stuff this is very useful for people who are asking I want to learn reverse engineering, now this video made it clear in addition to the video was going in a simple and an interesting way at the end I want to thank you and him for that great effort best wishes ❤
@ProducerBillionaire4 ай бұрын
Thank you David for this video. I like it
@davidbombal4 ай бұрын
You are very welcome. Glad to hear that!
@Artic_wolf1224 ай бұрын
Keep the Good work david😊😊😊
@davidbombal4 ай бұрын
Thank you!
@BlueLotusSecurity4 ай бұрын
Thank you for your continued sharing of valuable knowledge. Much appreciation for all you are doing. As I continue learning my ? is where would I look to see if an opensource distro is dialing out to someone after I install it.
@afeefkhateeb4 ай бұрын
Thank you so much David for this amazing video. I have a question what are the books for this field that are recommended for reading ?
@pl98204 ай бұрын
this is exactly what I wanted
@danushkastanley17464 ай бұрын
Let's go over to heap internals in the next video - David please :)
@migsman16394 ай бұрын
Awesome show lads 🎉
@peterwassmuth40144 ай бұрын
Awesome Thank you for Sharing 💯✴
@robotron12362 ай бұрын
I try to give myself one day a week of gaming. It takes me forever to finish everything, but it is what it is. I will say this though, skyrim modding taught me a lot about how software works and is actually what got me into a lot of this.
@TomCarbon3 ай бұрын
I always preferred AT&T syntax!! because it’s the way I learned and started assembly on 68k when I was seven yo. don’t get me wrong, I had to switch to Intel years after, but it was painful because 68k is kinda my “mother tongue” (and my blood is big endian lol) but things got better with ARM!
@0xbyt3z4 ай бұрын
yeah, this is the content i want. Thanks
@Bubbasaure924 ай бұрын
Love this!
@7etsuo.c4 ай бұрын
Amazing !!!
@andrew.igumenoff25 күн бұрын
I would love to see a guidance to reverse engineering for an absolute beginner who knows C and C++
@DãrK-10xjd4 ай бұрын
Hi David,i am looking for an laptop can you tell is galaxy book 2 pro i5 1240p laptop is good for this field?
@kedcaster28234 ай бұрын
is it still worth it to student C? or should I go python. as beginner
@sutfuf67564 ай бұрын
30:01: It's emtpy because $rip's value needs to be incremented by 0x7; i.e.: value of rip is referenced after lea is prefetched (or whatever its called). (gdb) x/s $rip+0xec0+7 0x555555556004: "Hi Mars" (gdb)
@noahdettmer52423 ай бұрын
I think I’m in over my head on this one 😂
@theshai2314 ай бұрын
I'm trying to understand, if program doesn't compile with -g flag it cannot reversed?
@landrover8274 ай бұрын
Can you do a video on how to run Kali Linux on Apple silicon?
@davidbombal4 ай бұрын
I made this video in the past, but I'll make a new video: kzbin.info/www/bejne/nJTVhKCYiq57q9E
@landrover8274 ай бұрын
@@davidbombal thank you! I wanted to run Kali in docker on my M1 Max but couldn’t seem to get the GUI to work. 🤨
@mrbumchinz19914 ай бұрын
Is this compatible with monitor mode: AWPCIE-1900U do u know?
@abdelazeezmabrouk4 ай бұрын
i followed your steps but i got a different results when i used gdb i got printif instead of puts@plt , i use gcc (Debian 13.2.0-24) 13.2.0
@otaanaa4 ай бұрын
how lucky i was to get to know this channel
@randomlegend6314 ай бұрын
This is some good stuff
@neiltropolis4 ай бұрын
This was great! Loved the the first part dealng with Linux heap. But honestly the way Microsoft has been down right bellecose by foisting software without even asking. The're blatant disregard for security and being underhanded about bug bounties. And If Windows goes to the cloud, forget about it. Linux, Linux.
@ChristopherBruns-o7o4 ай бұрын
6:01 Because if able to hex edit, imagine all the time you could save getting beyond the ninth level in super metroid using a custom exploit... 27:12 Yeah but this why y2k38 is so scary.
@mbazzouz4 ай бұрын
Brilliant!
@phaneedrakumaribharadwaj23924 ай бұрын
David my life ambition is to visit you atleast once
@hexyosyenite4 ай бұрын
Thanks
@MyDancingirl4 ай бұрын
Excellent fundamentals! Thank you
@stamshem124 ай бұрын
"Stephen Sims!" the best!!!!
@gabrieldut91464 ай бұрын
Hello David Bombal... ❤❤
@davidbombal4 ай бұрын
Hello!
@canberrafinest4 ай бұрын
awww, nice also can you make 'for dummies' introduction to this? give some analogy like morse code - code and decode the message then give a rough overview giving the starting point and the end result and then jump into the details lots of presenters jump right into nano details without linking them to the big picture
@carsonjamesiv25124 ай бұрын
NICE! 😃👍
@ChrisM5414 ай бұрын
I want to move 5 apples into the basket... "move #5, basket" makes perfect logical sense. "move basket, #5" is, frankly, silly. "Ah but, with enough practice you can get used to anything" - true, but that's no excuse. It's the same with justifying "=" and "==" because context awareness doesn't exist.
@thuweinmassoud9062Ай бұрын
What about jadex for java apk
@lordbacon49724 ай бұрын
This was amazing, but scary to think this was "very basic stuff". Can Stephen give a tutorial on how to go about reverse engineering and manipulating a saved game file?
@stopper02034 ай бұрын
Reverse engineering is my fav
@DeannaLobbins4 ай бұрын
Purchasing a stock may seem straightforward, but selecting the correct stock without a proven strategy can be exceedingly challenging. I've been working on expanding my $210K portfolio for a while, and my primary obstacle is the lack of clear entry and exit strategies. Any advice on this matter would be greatly appreciated.
@umeruddin34574 ай бұрын
27:15
@Accanfo3 ай бұрын
Cool
@hexyosyenite4 ай бұрын
Wow.
@kiddo20024 ай бұрын
David we need Reverse Engineering with Python
@davidbombal4 ай бұрын
I'll ask Stephen 😀
@mo_afr4 ай бұрын
6th David reply to me plzzzzzzzzzz idk just give me quote of the day 🤣
@davidbombal4 ай бұрын
I appreciate your support! Make the most of your life 😀
@mo_afr4 ай бұрын
@@davidbombal alright 😎
@MISTYEYED.4 ай бұрын
🔥🔥❤
@Artic_wolf1224 ай бұрын
Hello
@davidbombal4 ай бұрын
Hello!
@kintaro66424 ай бұрын
Pizzaa
@Fisjeie4 ай бұрын
Type shii
@skynet.yousha4 ай бұрын
Am i the only one who get lost in the middle of the video???
@Kyoz4 ай бұрын
🤍
@peakminute4 ай бұрын
This video is too complicated. I'd say it is for advanced in cybersecurity and programming.
@oO0_00o-m9i4 ай бұрын
Dear sir How to h**k cctv using wifi router
@DeannaLobbins4 ай бұрын
Purchasing a stock may seem straightforward, but selecting the correct stock without a proven strategy can be exceedingly challenging. I've been working on expanding my $210K portfolio for a while, and my primary obstacle is the lack of clear entry and exit strategies. Any advice on this matter would be greatly appreciated.