Reverse Engineering w/GDB and Ghidra! | picoCTF 2022 #08 "Keygenme"

  Рет қаралды 17,767

Jason Turley

Jason Turley

Жыл бұрын

Help support the channel with a like, comment & subscribe!
====Links====
🤖Discord: / discord
💻Blog: jasonturley.xyz/blog
🐔Twitter: / _jasonturley
🐙GitHub: github.com/JasonTurley
🔗LinkedIn: / jasonturley
====Support====
☕BuyMeACoffee: www.buymeacoffee.com/jasonturley
💖Donate Crypto: jasonturley.xyz/donate
🐳DigitalOcean: m.do.co/c/f2f4ad68767c ← receive $100 in credits
====Study Notes====
eJPT certification cheat sheet: github.com/JasonTurley/eJPT
GXPN/SANS SEC660 course review: jasonturley.xyz/sans-sec660-g...
====Music====
“Easy Hike” by Yari

Пікірлер: 31
@jasonturley
@jasonturley Жыл бұрын
Join us on Discord! discord.gg/v2BVAUyj3P
@aurinator
@aurinator 2 ай бұрын
Renaming things to make sense of the code flow was common, even back in the days with SoftICE before you had a GUI. Also though, rather than going into that function and Reversing it, you could just set its return value to the one you want without even messing with the logic in the function it enters.
@theadorelogon112
@theadorelogon112 Жыл бұрын
Nice demo! GDB is so sweet. Radare has always been my goto for reversing but I'm trying to experiment with Ghidra so a straight example like this was awesome. Also, thanks for not being obnoxious. I'll gently place a like and subscribe on this channel.
@jasonturley
@jasonturley Жыл бұрын
Thank you! I’ve played with Radare a few times, but I always revert back to GDB lol. Best of luck with Ghidra!
@womacko
@womacko Жыл бұрын
Your videos are totally underrated. This is pure gold for getting started. Thanks for the walkthrough. Stumbled across your channel when looking for "reverse engineering assembly" videos :) Please keep it up and keep uploading. Following!
@jasonturley
@jasonturley Жыл бұрын
That means the world to me! Thank you so much!
@kromaki131
@kromaki131 7 ай бұрын
Awesome video. I was looking for Ghidra introduction video because I'm new to it and then found yours. I didn't expect to have a great introduction to gdb too! It's not only helpful but also motivative. Thank you.
@jasonturley
@jasonturley 7 ай бұрын
Thank you! Glad I could help and best of luck with reverse engineering!
@Meodoc
@Meodoc 11 ай бұрын
Thanks! I have never used gdb (or ghidra) before, and with your help I managed to do my first reverse-engineering assignment for my university! :)
@jasonturley
@jasonturley 11 ай бұрын
That’s awesome! Great job!
@skrillyvito4232
@skrillyvito4232 9 ай бұрын
This was super helpful man thanks a lot
@user-kg7bj3bo4m
@user-kg7bj3bo4m 3 ай бұрын
I'm a complete noob when it comes to RE, but I understood most of this. Good job!
@jasonturley
@jasonturley 3 ай бұрын
Thank you, I’m glad it helped! I’m no expert on reverse engineering but it’s fun learning it
@PoliticalPanic
@PoliticalPanic Жыл бұрын
nice - thx for sharing.
@jasonturley
@jasonturley Жыл бұрын
Thanks for watching!
@anthonyramnarain9129
@anthonyramnarain9129 4 ай бұрын
Great Vid
@jasonturley
@jasonturley 4 ай бұрын
Thank you!
@axionet_dev
@axionet_dev Ай бұрын
I was select all variable and retype to char[x] char it worked.
@jasonturley
@jasonturley Ай бұрын
Nice!
@etopowertwon
@etopowertwon Жыл бұрын
I really wish debug in ghidra was not so complicated. It could probably rival x96dbg, which I really really miss in linux, as no amount of gefs make gdb comfy for common operations
@nyxon_x
@nyxon_x 10 ай бұрын
Hello, can i ask you why you can't find these values that the executable pushes onto the stack via Ghidra and you have to execute it via GBD and print them before returning? Where are these values coming from if they are not hardcoded somewhere? Are they obfuscated? --edit watching it again i see the MD5 uses the flag_pieces, which are hardcoded values, so theoretically you can reproduce this section of code and find the rest of the flag without GDB? I guess GDB is faster in this case, but i was wondering if there is something more i am missing.
@jasonturley
@jasonturley 5 ай бұрын
Hello! I’m sure you can find the flag entirely in Ghidra (or any other disassembler or decompiler) without having to use a debugger like GDB. Admittedly, I’m not great with Ghidra and feel more comfortable in GDB.
@user-is1qw9bn1f
@user-is1qw9bn1f 3 ай бұрын
I was also wondering how it set up unique keys for each person (to prevent copying) Unless it creates a unique one per entrant
@rrkatamakata7874
@rrkatamakata7874 8 ай бұрын
Do you have any guides for learning reverse engineering. The tools that you use and or the paths tat you recommend
@jasonturley
@jasonturley 8 ай бұрын
I made a video on this a while back. Admittedly, I think it needs to be remade with more info, but it should be a good starting point: kzbin.info/www/bejne/qnyqiohrrLZ2iaMsi=OM167_KG4Nx4ZfS0 I also recommend the KZbin channel LiveOverflow.
@user-ql6rp7dr9m
@user-ql6rp7dr9m Жыл бұрын
I really respect you and your hacking skills. Thanks for the video.
@jasonturley
@jasonturley Жыл бұрын
Thank you!
@muhammadziyad3648
@muhammadziyad3648 4 ай бұрын
can you do reverse engineering state of survival using ghidra ?
@jasonturley
@jasonturley 2 ай бұрын
I plan to do more game hacking content in the future, currently I’m focusing on more penetration testing related stuff
Unpacking Linux Binaries | picoCTF 2022 #07 "unpackme"
11:01
Jason Turley
Рет қаралды 684
GHIDRA for Reverse Engineering (PicoCTF 2022 #42 'bbbloat')
17:44
John Hammond
Рет қаралды 194 М.
Cute Barbie Gadget 🥰 #gadgets
01:00
FLIP FLOP Hacks
Рет қаралды 33 МЛН
Китайка и Пчелка 4 серия😂😆
00:19
KITAYKA
Рет қаралды 1,2 МЛН
格斗裁判暴力执法!#fighting #shorts
00:15
武林之巅
Рет қаралды 96 МЛН
Omega Boy Past 3 #funny #viral #comedy
00:22
CRAZY GREAPA
Рет қаралды 34 МЛН
A Competition for Unreadable Code?
12:33
LaurieWired
Рет қаралды 135 М.
everything is open source if you can reverse engineer (try it RIGHT NOW!)
13:56
Low Level Learning
Рет қаралды 1,2 МЛН
Software Reverse Engineering with Ghidra
31:08
CAE in Cybersecurity Community
Рет қаралды 11 М.
Bare-metal ARM firmware reverse engineering with Ghidra and SVD-Loader
14:40
How to reverse engineer your favourite game
35:09
Exellys
Рет қаралды 49 М.
Ghidra ГАЙД дизасм для новичков
12:55
Айтишник 👩‍💻
Рет қаралды 14 М.
Learn Reverse Engineering (for hacking games)
7:26
cazz
Рет қаралды 970 М.
Reverse Engineering Data Files
1:59:16
Tsoding Daily
Рет қаралды 38 М.
АСЛАНЯН: Китайский автопром - это обман россиян
7:57
Ходорковский LIVE
Рет қаралды 142 М.
POCO F6 PRO - ЛУЧШИЙ POCO НА ДАННЫЙ МОМЕНТ!
18:51
Эволюция телефонов!
0:30
ТРЕНДИ ШОРТС
Рет қаралды 6 МЛН
iPhone 15 Pro vs Samsung s24🤣 #shorts
0:10
Tech Tonics
Рет қаралды 10 МЛН
Mi primera placa con dios
0:12
Eyal mewing
Рет қаралды 503 М.
Xiaomi Note 13 Pro по безумной цене в России
0:43
Простые Технологии
Рет қаралды 2 МЛН