Big thank you to Brilliant for sponsoring this video! To try Brilliant for free (for 30 days) and to get a 20% discount, visit: Brilliant.org/davidbombal // KZbin video REFERENCE // Free Exploit development training (beginner and advanced) kzbin.info/www/bejne/gojQqmaqbZl0f9E Buffer Overflow Hacking Tutorial (Bypass Passwords): kzbin.info/www/bejne/mWOlp4Zoi9Z3jck // Stephen's Social // X: x.com/Steph3nSims KZbin: www.youtube.com/@OffByOneSecurity // Stephen RECOMMENDS // Disassemblers: Binary Ninja: binary.ninja/ IDA Pro: hex-rays.com/products/%20ida/ Ghidra: ghidra-sre.org/ Free Learning Resources: An Intro to C for Windows Dev: www.sans.org/webcasts/intro-c-windows-devs/ Books Gray Hat Hacking Series by various authors: US amzn.to/3B1FeIK UK amzn.to/3A920AL The IDA Pro Book, 2nd Edition: The Unofficial Guide to the World's Most Popular Disassembler Second Edition by Chris Eagle US amzn.to/3Yv3srw UK amzn.to/3Wtz8e6 // David's SOCIAL // Discord: discord.com/invite/usKSyzb X: www.x.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal KZbin: www.youtube.com/@davidbombal // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 00:00 - Intro 01:06 - Brilliant sponsored segment 02:36 - Stephen Sims // Off By One Security KZbin channel 04:02 - Hello World 06:11 - Learning the C programming language 09:34 - Introduction to reverse engineering 13:57 - Functions explained 16:43 - Stripped explained 18:03 - Disassemble explained // Differences between flavors 25:11 - History behind the two flavors 25:58 - Disassemble explained continued 26:22 - Return oriented programming explained 27:14 - Reverse engineering demo 01:07:46 - IDA Pro Demo 01:16:42 - Conclusion Disclaimer: This video is for educational purposes only. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #android #ios #hacker
@rojansapkotaofficial5 ай бұрын
Everyone's "Hello World" is the gateway drug to programming.
@davidbombal5 ай бұрын
😂
@SpinyDisk5 ай бұрын
„gateway drug to programming“. Where have I heard that? ;) (For anyone wondering I think the comment is mentioning fireship.)
@savagepro90605 ай бұрын
@@atlantic_love it's a drug, therefore abused, not over-used
@dean61255 ай бұрын
It was originally (if your old 😆) 10 print "hello world" 20 goto 10
@Qqqqqqqqqqqqq-l6b5 ай бұрын
@@davidbombal Bro can you make a video on how to extract vuln websites plz bombal sir ❤
@mbazzouz5 ай бұрын
A good reference for folks who like to learn from a book is Practical Binary Analysis (no starch press) - it does require familiarity with C and assembly.
@meredithunit5 ай бұрын
This is probably one of my favorite videos I’ve seen this year. It does go deeper than others, but if you’re interested in this, if you’re interested in malware analysis and reverse engineering, this is a powerful primer
@Wired_And_Grounded5 ай бұрын
Amazing how smart and how passionate he is, I have no idea what he was talking about half the time but I tried to lol. Great content as always David
@davidbombal5 ай бұрын
We can all learn so much from Stephen! Look at the free C course he mentioned (linked in the video description).
@Wired_And_Grounded5 ай бұрын
@@davidbombalThank you! I love your channel and videos, it’s honestly what inspires me to continue down the path of cyber security. I was also wondering about MOK management, Platform Keys, KeK Keys, etc (for UEFI bios) and TPM(secure boot) and what vulnerabilities this could prevent or even not prevent.
@SoundsLikeOdie5 ай бұрын
I remember doing assembler language for the intel 80386 30 years ago. We had a colourful IDE all the registers were neatly displayed. It was much easier to follow then purely a text based solution. I remember stepping through my code and connecting directly to the hardware. Ridiculously fast executions.
@dadgeman825 ай бұрын
I'm going to watch this one twice. This guy is a great teacher.
@xanaxity4 ай бұрын
Smart guests, smart host, smart community makes davidbambal the legendary youtuber for not only who starting out but for intermediate and pros as well.
@CedroCron5 ай бұрын
Way over my head, but I enjoyed it anyway. Thanks David!
@OiiBruv.o75 ай бұрын
yeah i'm so lost lmao, glad i'm not the only one
@TheTubejunky5 ай бұрын
It's only over your head if you are short minded......😅
@aliabbas485 ай бұрын
Love to see some real deep tech videos from your channel David!
@irrationalywise5 ай бұрын
It's great quick overview of the underlying basic principles of Reverse Engineering. Thank you for this amazing content, that too for Free!. It really helps.
@danushkastanley17465 ай бұрын
Oh my goodness! the amount of excitement I got when I saw the video
@davidbombal5 ай бұрын
So happy to hear that! 😀
@CyberDevilSec5 ай бұрын
Oh my god! Welcome back!! I remember you i thought your last interview was SO COOL with David! I can't wait to watch this episode.
@BrianAHarkins5 ай бұрын
Was just looking into this topic. The timing couldn’t be better. Thanks! 🎉
@mytechnotalent5 ай бұрын
Great video and tutorial as RE is so critical. Thank you both!
@davidbombal5 ай бұрын
You're welcome! I hope you enjoy the video!
@iMshadabАй бұрын
Please do more of these "complex" videos with Stephen Sims. He is amazing!
@Mastertvt9135 ай бұрын
This was fun, i cant fathom how good stephen courses are he is great at what he does
@kaylarose99855 ай бұрын
Thank you for putting out great content David. Thank you as well Stephen!
@davidbombal5 ай бұрын
Thank you. I hope you learn something new 😀
@NatteeSetobol5 ай бұрын
There's a lot of "easy stuff" I haven't learned, so I don't mind if you cover the "easy" stuff because I still might learn something new! Steven is great, I watched every thing on his channel and learned a lot!
@YLprime5 ай бұрын
Reverse engineering is really not for beginners. You need C, x86 asm, windows internals, system programming, know a dynamic debugging tool such as x64dbg, a static debugging tool like ghidra and hours of crackmes.
@a01A014 ай бұрын
yep it's hard but with song called omfg hello 😂 it fun am all in
@zangin4 ай бұрын
this is great for somebody who’s a programmer but never went this deep into it. i love it. its a great video for self teaching if you have a basic understanding of what’s going on
@bgmieditscy3 ай бұрын
Have you tried reverse engineering?
@Rahul-z3nl2 ай бұрын
I know python its possible 😢
@MangyPL2 ай бұрын
and a lot of intelligence.
@alfatech86045 ай бұрын
Thanks to all of you for this video I got better explanations. I want to learn advance things but most of the courses are expensive and trying to figure things out the hard way, since I am not following a well-known path.
@CyberDevilSec5 ай бұрын
I was already subbed since last episode! And i read your book YEARS ago ^^ Huge fan Stephen!
@camelotenglishtuition63945 ай бұрын
Absolutely love him. His channel is excellent too!
@shasikiran21515 ай бұрын
David talks!!! Cyber Rocks!!!😎😎😎
@davidbombal5 ай бұрын
Thank you
@robotron12363 ай бұрын
I try to give myself one day a week of gaming. It takes me forever to finish everything, but it is what it is. I will say this though, skyrim modding taught me a lot about how software works and is actually what got me into a lot of this.
@aounhaider83355 ай бұрын
Keep sharing such amazing tutorials!!
@TomCarbon4 ай бұрын
@31:19, if x/s $rip+0xec4 doesn’t work, it’s because you also need to add the 7 bytes taken by the instruction, 0x…5ffd + 7 = 0x…6004
@ProducerBillionaire5 ай бұрын
Thank you David for this video. I like it
@davidbombal5 ай бұрын
You are very welcome. Glad to hear that!
@bbowling6195 ай бұрын
When i listen to this level of knowledge it reminds me of watching John Hammond reverse engineering videos. My brain literally brakes and pukes on itself, but once i listen to it again and i keep improving, i eventually get 0% of it. lol just kidding but also not kidding !! Please keep them coming. OTW is fun as well. Keep it fun @david. Good stuff !!
@mohamedabozaid21475 ай бұрын
Hello sir, this video is really great it gives a good idea about basics and how everything is going in reversing stuff this is very useful for people who are asking I want to learn reverse engineering, now this video made it clear in addition to the video was going in a simple and an interesting way at the end I want to thank you and him for that great effort best wishes ❤
@Artic_wolf1225 ай бұрын
Keep the Good work david😊😊😊
@davidbombal5 ай бұрын
Thank you!
@danushkastanley17465 ай бұрын
Let's go over to heap internals in the next video - David please :)
@pl98205 ай бұрын
this is exactly what I wanted
@migsman16395 ай бұрын
Awesome show lads 🎉
@fslurrehman5 ай бұрын
1. Patching a DLL: How can I patch a DLL used by a Windows program so that when a function in the DLL is called, it logs a message to a file saying "I am called" and also logs the data in variables or the stack? 2. IDC Scripting: Can you help me write an IDC script for IDA Pro, or a similar script in Ghidra, that logs the functions being called, their addresses, the stack variables, and which part of the data file is being used when I run the program between two breakpoints? 3. How can I find out how a program reads an encrypted or obfuscated file and converts its content? Also, what are `bcrypt.dll` and `bcryptprimitives.dll` used for and how to use them?
@TomCarbon4 ай бұрын
I always preferred AT&T syntax!! because it’s the way I learned and started assembly on 68k when I was seven yo. don’t get me wrong, I had to switch to Intel years after, but it was painful because 68k is kinda my “mother tongue” (and my blood is big endian lol) but things got better with ARM!
@peterwassmuth40145 ай бұрын
Awesome Thank you for Sharing 💯✴
@noahdettmer52424 ай бұрын
I think I’m in over my head on this one 😂
@0xbyt3z5 ай бұрын
yeah, this is the content i want. Thanks
@andrew.igumenoffАй бұрын
I would love to see a guidance to reverse engineering for an absolute beginner who knows C and C++
@MyDancingirl5 ай бұрын
Excellent fundamentals! Thank you
@BlueLotusSecurity5 ай бұрын
Thank you for your continued sharing of valuable knowledge. Much appreciation for all you are doing. As I continue learning my ? is where would I look to see if an opensource distro is dialing out to someone after I install it.
@neiltropolis5 ай бұрын
This was great! Loved the the first part dealng with Linux heap. But honestly the way Microsoft has been down right bellecose by foisting software without even asking. The're blatant disregard for security and being underhanded about bug bounties. And If Windows goes to the cloud, forget about it. Linux, Linux.
@afeefkhateeb5 ай бұрын
Thank you so much David for this amazing video. I have a question what are the books for this field that are recommended for reading ?
@otaanaa5 ай бұрын
how lucky i was to get to know this channel
@Bubbasaure925 ай бұрын
Love this!
@phaneedrakumaribharadwaj23925 ай бұрын
David my life ambition is to visit you atleast once
@theshai2315 ай бұрын
I'm trying to understand, if program doesn't compile with -g flag it cannot reversed?
@landrover8275 ай бұрын
Can you do a video on how to run Kali Linux on Apple silicon?
@davidbombal5 ай бұрын
I made this video in the past, but I'll make a new video: kzbin.info/www/bejne/nJTVhKCYiq57q9E
@landrover8275 ай бұрын
@@davidbombal thank you! I wanted to run Kali in docker on my M1 Max but couldn’t seem to get the GUI to work. 🤨
@kedcaster28235 ай бұрын
is it still worth it to student C? or should I go python. as beginner
@7etsuo.c5 ай бұрын
Amazing !!!
@abdelazeezmabrouk5 ай бұрын
i followed your steps but i got a different results when i used gdb i got printif instead of puts@plt , i use gcc (Debian 13.2.0-24) 13.2.0
@mrbumchinz19915 ай бұрын
Is this compatible with monitor mode: AWPCIE-1900U do u know?
@stamshem125 ай бұрын
"Stephen Sims!" the best!!!!
@gabrieldut91465 ай бұрын
Hello David Bombal... ❤❤
@davidbombal5 ай бұрын
Hello!
@randomlegend6315 ай бұрын
This is some good stuff
@canberrafinest5 ай бұрын
awww, nice also can you make 'for dummies' introduction to this? give some analogy like morse code - code and decode the message then give a rough overview giving the starting point and the end result and then jump into the details lots of presenters jump right into nano details without linking them to the big picture
@thuweinmassoud90622 ай бұрын
What about jadex for java apk
@sutfuf67565 ай бұрын
30:01: It's emtpy because $rip's value needs to be incremented by 0x7; i.e.: value of rip is referenced after lea is prefetched (or whatever its called). (gdb) x/s $rip+0xec0+7 0x555555556004: "Hi Mars" (gdb)
@DãrK-10xjd5 ай бұрын
Hi David,i am looking for an laptop can you tell is galaxy book 2 pro i5 1240p laptop is good for this field?
@lordbacon49725 ай бұрын
This was amazing, but scary to think this was "very basic stuff". Can Stephen give a tutorial on how to go about reverse engineering and manipulating a saved game file?
@hexyosyenite5 ай бұрын
Thanks
@ChrisM5415 ай бұрын
I want to move 5 apples into the basket... "move #5, basket" makes perfect logical sense. "move basket, #5" is, frankly, silly. "Ah but, with enough practice you can get used to anything" - true, but that's no excuse. It's the same with justifying "=" and "==" because context awareness doesn't exist.
@stopper02035 ай бұрын
Reverse engineering is my fav
@mbazzouz5 ай бұрын
Brilliant!
@ChristopherBruns-o7o5 ай бұрын
6:01 Because if able to hex edit, imagine all the time you could save getting beyond the ninth level in super metroid using a custom exploit... 27:12 Yeah but this why y2k38 is so scary.
@carsonjamesiv25125 ай бұрын
NICE! 😃👍
@TheTubejunky5 ай бұрын
Pro tip: videos with sample code in them di much better because many can follow along and take oridw in ACTUALLY creating something to show off. Great video
@DeannaLobbins5 ай бұрын
Purchasing a stock may seem straightforward, but selecting the correct stock without a proven strategy can be exceedingly challenging. I've been working on expanding my $210K portfolio for a while, and my primary obstacle is the lack of clear entry and exit strategies. Any advice on this matter would be greatly appreciated.
@kiddo20025 ай бұрын
David we need Reverse Engineering with Python
@davidbombal5 ай бұрын
I'll ask Stephen 😀
@MISTYEYED.5 ай бұрын
🔥🔥❤
@Accanfo4 ай бұрын
Cool
@umeruddin34575 ай бұрын
27:15
@hexyosyenite5 ай бұрын
Wow.
@mo_afr5 ай бұрын
6th David reply to me plzzzzzzzzzz idk just give me quote of the day 🤣
@davidbombal5 ай бұрын
I appreciate your support! Make the most of your life 😀
@mo_afr5 ай бұрын
@@davidbombal alright 😎
@Artic_wolf1225 ай бұрын
Hello
@davidbombal5 ай бұрын
Hello!
@skynet.yousha5 ай бұрын
Am i the only one who get lost in the middle of the video???
@oO0_00o-m9i5 ай бұрын
Dear sir How to h**k cctv using wifi router
@kintaro66425 ай бұрын
Pizzaa
@Fisjeie5 ай бұрын
Type shii
@Kyoz5 ай бұрын
🤍
@peakminute5 ай бұрын
This video is too complicated. I'd say it is for advanced in cybersecurity and programming.
@DeannaLobbins5 ай бұрын
Purchasing a stock may seem straightforward, but selecting the correct stock without a proven strategy can be exceedingly challenging. I've been working on expanding my $210K portfolio for a while, and my primary obstacle is the lack of clear entry and exit strategies. Any advice on this matter would be greatly appreciated.