Reverse Engineering w/GDB and Ghidra! | picoCTF 2022 #08 "Keygenme"

  Рет қаралды 28,433

Jason Turley

Jason Turley

Күн бұрын

Пікірлер: 39
@jasonturley
@jasonturley 2 жыл бұрын
Join us on Discord! discord.gg/v2BVAUyj3P
@theadorelogon112
@theadorelogon112 2 жыл бұрын
Nice demo! GDB is so sweet. Radare has always been my goto for reversing but I'm trying to experiment with Ghidra so a straight example like this was awesome. Also, thanks for not being obnoxious. I'll gently place a like and subscribe on this channel.
@jasonturley
@jasonturley 2 жыл бұрын
Thank you! I’ve played with Radare a few times, but I always revert back to GDB lol. Best of luck with Ghidra!
@aurinator
@aurinator 9 ай бұрын
Renaming things to make sense of the code flow was common, even back in the days with SoftICE before you had a GUI. Also though, rather than going into that function and Reversing it, you could just set its return value to the one you want without even messing with the logic in the function it enters.
@Meodoc
@Meodoc Жыл бұрын
Thanks! I have never used gdb (or ghidra) before, and with your help I managed to do my first reverse-engineering assignment for my university! :)
@jasonturley
@jasonturley Жыл бұрын
That’s awesome! Great job!
@womacko
@womacko Жыл бұрын
Your videos are totally underrated. This is pure gold for getting started. Thanks for the walkthrough. Stumbled across your channel when looking for "reverse engineering assembly" videos :) Please keep it up and keep uploading. Following!
@jasonturley
@jasonturley Жыл бұрын
That means the world to me! Thank you so much!
@kromaki131
@kromaki131 Жыл бұрын
Awesome video. I was looking for Ghidra introduction video because I'm new to it and then found yours. I didn't expect to have a great introduction to gdb too! It's not only helpful but also motivative. Thank you.
@jasonturley
@jasonturley Жыл бұрын
Thank you! Glad I could help and best of luck with reverse engineering!
@PerJensen-k9r
@PerJensen-k9r 10 ай бұрын
I'm a complete noob when it comes to RE, but I understood most of this. Good job!
@jasonturley
@jasonturley 10 ай бұрын
Thank you, I’m glad it helped! I’m no expert on reverse engineering but it’s fun learning it
@skrillyvito4232
@skrillyvito4232 Жыл бұрын
This was super helpful man thanks a lot
@minhkhoavo5807
@minhkhoavo5807 2 ай бұрын
How can you double click 18:19, I can not select to coppy it. And at 19:15 when I scroll down to the stack storing the 8 units, It don't same you.
@jasonturley
@jasonturley 2 ай бұрын
Great question. I pressed the shift key in order to select the text. GDB TUI mode doesn’t directly support copy/paste, but you can bypass it with the shift key. Are you saying you see something different at 19:15? If so, what do you see?
@rrkatamakata7874
@rrkatamakata7874 Жыл бұрын
Do you have any guides for learning reverse engineering. The tools that you use and or the paths tat you recommend
@jasonturley
@jasonturley Жыл бұрын
I made a video on this a while back. Admittedly, I think it needs to be remade with more info, but it should be a good starting point: kzbin.info/www/bejne/qnyqiohrrLZ2iaMsi=OM167_KG4Nx4ZfS0 I also recommend the KZbin channel LiveOverflow.
@nyxon_x
@nyxon_x Жыл бұрын
Hello, can i ask you why you can't find these values that the executable pushes onto the stack via Ghidra and you have to execute it via GBD and print them before returning? Where are these values coming from if they are not hardcoded somewhere? Are they obfuscated? --edit watching it again i see the MD5 uses the flag_pieces, which are hardcoded values, so theoretically you can reproduce this section of code and find the rest of the flag without GDB? I guess GDB is faster in this case, but i was wondering if there is something more i am missing.
@jasonturley
@jasonturley Жыл бұрын
Hello! I’m sure you can find the flag entirely in Ghidra (or any other disassembler or decompiler) without having to use a debugger like GDB. Admittedly, I’m not great with Ghidra and feel more comfortable in GDB.
@anon1234mouse
@anon1234mouse 10 ай бұрын
I was also wondering how it set up unique keys for each person (to prevent copying) Unless it creates a unique one per entrant
@etopowertwon
@etopowertwon Жыл бұрын
I really wish debug in ghidra was not so complicated. It could probably rival x96dbg, which I really really miss in linux, as no amount of gefs make gdb comfy for common operations
@MouatassimMajhoul
@MouatassimMajhoul 5 ай бұрын
If not then why not select the arch and mode directly insted of selecting windows executable for .exe files ?
@VivekKumar-gg6cz
@VivekKumar-gg6cz 6 ай бұрын
What shortcut you used at 7:40
@jasonturley
@jasonturley 6 ай бұрын
I think I did Alt +
@anthonyramnarain9129
@anthonyramnarain9129 11 ай бұрын
Great Vid
@jasonturley
@jasonturley 11 ай бұрын
Thank you!
@PoliticalPanic
@PoliticalPanic Жыл бұрын
nice - thx for sharing.
@jasonturley
@jasonturley Жыл бұрын
Thanks for watching!
@axionet_dev
@axionet_dev 9 ай бұрын
I was select all variable and retype to char[x] char it worked.
@jasonturley
@jasonturley 8 ай бұрын
Nice!
@muhammadziyad3648
@muhammadziyad3648 11 ай бұрын
can you do reverse engineering state of survival using ghidra ?
@jasonturley
@jasonturley 9 ай бұрын
I plan to do more game hacking content in the future, currently I’m focusing on more penetration testing related stuff
@坂井正樹-g1y
@坂井正樹-g1y Жыл бұрын
I really respect you and your hacking skills. Thanks for the video.
@jasonturley
@jasonturley Жыл бұрын
Thank you!
@XnndjehdhkNxndjhds
@XnndjehdhkNxndjhds 4 ай бұрын
Johnson George Jones Matthew Johnson Dorothy
@MaximusHyde
@MaximusHyde 4 күн бұрын
well, i made it through 51 seconds of annoying typing sounds, but i couldn't take any more. good job me.
@jasonturley
@jasonturley 3 күн бұрын
Yea my old mechanical keyboard was pretty annoying. I’m surprised so many people put up with it lol
Unpacking Linux Binaries | picoCTF 2022 #07 "unpackme"
11:01
Jason Turley
Рет қаралды 1,2 М.
GHIDRA for Reverse Engineering (PicoCTF 2022 #42 'bbbloat')
17:44
John Hammond
Рет қаралды 225 М.
It’s all not real
00:15
V.A. show / Магика
Рет қаралды 20 МЛН
How to treat Acne💉
00:31
ISSEI / いっせい
Рет қаралды 108 МЛН
you need to stop using print debugging (do THIS instead)
7:07
Low Level
Рет қаралды 461 М.
Reverse Engineering and Weaponizing XP Solitaire (Mini-Course)
2:50:50
jeFF0Falltrades
Рет қаралды 64 М.
Software Reverse Engineering with Ghidra
31:08
CAE in Cybersecurity Community
Рет қаралды 19 М.
How to Crack Software (Reverse Engineering)
16:16
Eric Parker
Рет қаралды 817 М.
How a Microcontroller starts
28:49
Artful Bytes
Рет қаралды 72 М.
Can YOU Reverse Engineer this Simple Binary? (picoCTF 2023 "Reverse")
11:47
Patching Binaries (with vim, Binary Ninja, Ghidra and radare2)
21:00
Google CTF - BEGINNER Reverse Engineering w/ ANGR
39:47
John Hammond
Рет қаралды 289 М.
It’s all not real
00:15
V.A. show / Магика
Рет қаралды 20 МЛН