Reversing WannaCry Part 1 - Finding the killswitch and unpacking the malware in

  Рет қаралды 1,393,359

stacksmashing

stacksmashing

Күн бұрын

Part 2 is out! • Reversing WannaCry Par...
In this first video of the "Reversing WannaCry" series we will look at the infamous killswitch and the installation and unpacking procedure of WannaCry.
Twitter: / ghidraninja
Links:
- Interview with MalwareTech: / s3-episode-11-wannacry...
- MalwareTech's blogpost about the killswitch: www.malwaretec...
Further reading
- Wikipedia: en.wikipedia.o...
- LogRhythm Analysis: logrhythm.com/...
- Secureworks Analysis: www.securework...

Пікірлер: 848
@_a_x_s_
@_a_x_s_ 5 жыл бұрын
Reverse engineering enhances the understanding of both programming thought and skills. This video is easy to follow, and the main techniques of reverse engineering are shown clearly, which makes me want to decompile a small interesting program to analyze it.
@wanderingpalace
@wanderingpalace 4 жыл бұрын
安笑生 yeah we can learn programming from reverse engineering stuffs 你好同志
@r0x304
@r0x304 3 жыл бұрын
lol
@ADeeSHUPA
@ADeeSHUPA 2 жыл бұрын
@@wanderingpalace 安笑生
@gameacc6079
@gameacc6079 Жыл бұрын
@@wanderingpalace i love xi jinping's huge cawk
@muth69
@muth69 10 ай бұрын
@@wanderingpalace no you absolutely can't
@SouravTechLabs
@SouravTechLabs 5 жыл бұрын
Looks like Ghidra is a very good renaming tool!
@vladysmaximov6156
@vladysmaximov6156 4 жыл бұрын
I prefer ollydbg 2.01 or x64dbg for 64 bit, ghidra makes really easy the reverse process, can get a source code... I prefer analyze asm instructions one by one for understand fully process but this isn't the best stategy.. one by one can take you a lot of time i use call stack window for locate specific part i want to analyze!
@aasquared8191
@aasquared8191 4 жыл бұрын
@@vladysmaximov6156 keep us posted mate
@Luzum
@Luzum 4 жыл бұрын
@@vladysmaximov6156 weird flex but ok
@madghostek3026
@madghostek3026 4 жыл бұрын
@@vladysmaximov6156 I tried out ghidra and improved my performance like 10 times (mainly due to being shit in reading asm fast).
@jonarmani8654
@jonarmani8654 4 жыл бұрын
@@vladysmaximov6156 You absolute pleb. Version 1.10 or GTFO.
@lynx5327
@lynx5327 5 жыл бұрын
I'm a vegetable that doesn't understand anything but this was an interesting video
@GamerTheTurtle
@GamerTheTurtle 5 жыл бұрын
@@ayylmaoglow takes one to know one! unless you're a reptilian
@ThisDaveAndThatJohn
@ThisDaveAndThatJohn 5 жыл бұрын
read the book Code by Charles Petzold. You will understand how the CPU and assembler works even if you are a total noob. After that you will automatically understand how programming languages work, reverse engineering too and so on.
@ThisDaveAndThatJohn
@ThisDaveAndThatJohn 5 жыл бұрын
@Rajath Pai trust me. Petzold is a guru
@zxxczczczcz
@zxxczczczcz 5 жыл бұрын
@@ThisDaveAndThatJohn code by charles petzold?
@HimanshuPal-li7nj
@HimanshuPal-li7nj 4 жыл бұрын
Ok BOOMER
@l2ubio
@l2ubio 4 жыл бұрын
"Microsoft security center (2.0) sevice" LMAO
@_nit
@_nit 4 жыл бұрын
Wow that was probably one of the best descriptive reverse engineering videos I've seen to date. Your method of explaining and showcasing each step in each function is fantastic and even explaining how to identify when disassemblers/decompilers mess up and how to fix them. Bravo. I'm upset that I waited this long to actually start watching these videos.
@vasilysu
@vasilysu 2 ай бұрын
Fully agree, amazing video! Simple step by step explanation is excellent!
@tomasviane3844
@tomasviane3844 5 жыл бұрын
I didn't understand anything of what you did, but the casualness of explaining something so exoticly complicated drew me in.
@MrMasterRhythm
@MrMasterRhythm 5 жыл бұрын
Love this! Please create a series of Reverse Engineering Basics!
@oliviasmith4680
@oliviasmith4680 5 жыл бұрын
Yes
@MattZelda
@MattZelda 5 жыл бұрын
Just gotta learn GDB, Radare, OllyDBG for Windows, and assembly. And even then the assembly is the part that while takes the longest isn't too bad once you get used to it.
@MattZelda
@MattZelda 5 жыл бұрын
Oh and IDA / Binary Ninja are good too.
@i-use-arch-btw3954
@i-use-arch-btw3954 5 жыл бұрын
WannaCry: exists Ghidra: im about to end this mans whole carrer
@xyphoes345
@xyphoes345 5 жыл бұрын
what the H E C C is a carrer
@glowingone1774
@glowingone1774 5 жыл бұрын
@@xyphoes345 it's a carrer
@xyphoes345
@xyphoes345 5 жыл бұрын
@@glowingone1774 isnt it meant to be a *career* tho
@glowingone1774
@glowingone1774 5 жыл бұрын
@@xyphoes345 no this is much different.
@quaintfalopa9724
@quaintfalopa9724 5 жыл бұрын
but wannacry isnt a man
@John0123.
@John0123. 5 жыл бұрын
You know too many things. You explain it too casually like it's food lmao. This guy be like: Ok, let me present you my house.
@lionkor98
@lionkor98 5 жыл бұрын
hijacking this to say WE NEED PART 2
@User-ko3un
@User-ko3un 4 жыл бұрын
Inserts his too powerful(smart) to be kept alive meme*
@acc373r4t0r
@acc373r4t0r 4 жыл бұрын
looks pretty standard to me
@NanoValorant
@NanoValorant 4 жыл бұрын
Plot twist: he is the hacker who made wanna cry
@brunph6174
@brunph6174 4 жыл бұрын
marv b first 20 minutes is really basic stuff. Its just general reversing and assigning names
@TheDankTiel
@TheDankTiel 5 жыл бұрын
I understood everything except for the renaming parts. Meaning i did not understand a thing. Cool vid tho, you've earned a sub!
@andrasfogarasi5014
@andrasfogarasi5014 5 жыл бұрын
Reading the WannaCry warning, the creaters were real lads, providing multiple languages, information about BitCoin and a contact method. They just sound incredibly kind.
@gabe6278
@gabe6278 5 жыл бұрын
tbh, i think they knew that they would affect millions of devices. humble people
@SteppingStonevlogs
@SteppingStonevlogs 3 жыл бұрын
Kind, maybe not, but they were reasonable. Do as we ask and we promise all will be well. And see we have written in clear language what we want you to understand. Give us the money and have a nice day 😊
@kahlzun
@kahlzun Жыл бұрын
professionals have *standards*
@hiddenaether
@hiddenaether Жыл бұрын
cant get money from someone who cant understand what they are reading
@ryannorthup3148
@ryannorthup3148 Жыл бұрын
@@kahlzun Investigations show that this was most likely an attack by the North-Korean Government-Controlled Lazarus hacking group to fund nuclear programs and Fatass Jong Un's Sanction-Bypassing Goldschlager run. Eh, probably not Goldschlager. The fatass is probably going for something more expensive.
@traida111
@traida111 3 жыл бұрын
The thing that blew my mind the most, was the list of language translations you found in the passworded zip. Made me realize how much they really scaled this thing to take on the world. Absolute savage. Who ever did this was well organized. Do you ever wonder if they watched this video?
@hiddenaether
@hiddenaether Жыл бұрын
they make locale translators for batch translating, prob took them about 5 minutes to translate all locales. The least impressive part
@traida111
@traida111 Жыл бұрын
@@hiddenaether then why hide it with such levels of encryption? it would be easy to just use english, but instead they have the ambition to take on the world.
@saadeddhaher1706
@saadeddhaher1706 4 жыл бұрын
everyone: try not downloading files from entrusted places!!! Ghidra: let's unpack the malware !
@naxzed_it
@naxzed_it 4 жыл бұрын
@starshipeleven He could use a VM.
@brunoeilhart8516
@brunoeilhart8516 4 жыл бұрын
What is an entrusted place?
@fatfr0g570
@fatfr0g570 4 жыл бұрын
starshipeleven presumably you download the sample from within the VM, then disable the Ethernet adapter that gives the VM Internet access to prevent worms from going through the connection.
@fatfr0g570
@fatfr0g570 4 жыл бұрын
starshipeleven forgot about that option, thanks for reminding me.
@yaelm631
@yaelm631 4 жыл бұрын
Just something that scares me : They are easy accessible websites to download loads of virus to try antivirus and understanding how they work ? I hope they tell the user several warnings before sending the file
@Elffi
@Elffi 5 жыл бұрын
Ghidra: *does windows reverse engineering in iOS* Windows: "Am I a joke to you?"
@rohitas2050
@rohitas2050 5 жыл бұрын
macOS*
@Elffi
@Elffi 5 жыл бұрын
@@rohitas2050 woops
@Juppie902
@Juppie902 4 жыл бұрын
more like Reclass: Am I a Joke to you ?
@smwfreak1647
@smwfreak1647 4 жыл бұрын
@@Elffi LOL
@ThoughtinFlight
@ThoughtinFlight 5 жыл бұрын
This was SUPER interesting and well made, please continue! You left us on a cliffhanger!
@rubenco1253
@rubenco1253 5 жыл бұрын
I am currently doing my bachelor in Computer Science and didn't know this reverse engineering even existed! Very cool and very nicely explained. Showing the keyboard output is also a nice addition of you! Thanks :)
@elijahburnham7882
@elijahburnham7882 4 жыл бұрын
RubenCO what language is this in?
@Slenderman63323
@Slenderman63323 Жыл бұрын
@@elijahburnham7882 The left side of Ghidra is x86 Assembly and the right side is C.
@hjrgf
@hjrgf 7 ай бұрын
​@@Slenderman63323you need low level knowledge to be able to do stuff like this since the c code that is outputed is very low level
@georgedomse
@georgedomse 5 жыл бұрын
Just wow. Impressive job! I hope you are employed by one of the major tech/AV companies.
@funnypallu
@funnypallu 5 жыл бұрын
I am just happy that there are people out there who understand stuff like this! 😅
@BernhardMillauer
@BernhardMillauer 5 жыл бұрын
That was very insightful! I'm a software developer/architect for 17 years now and I must say that you have a very nice way to tell details and to guide your audience. thank you very much! for the follow up video I would like to see the "physical" impact of the malware, like show the registry-key or the installation folder to make it more understandable for non-developers.
@not_glad
@not_glad 7 ай бұрын
I have a few questions. I've done vb coding for years, but more as a supplement to my other work loads, I'm not a full blown dev. First, what was so hard about spotting the kill switch? There must have been a lot of the best devs looking at this code globally for 4 days, the guy who killed it even did that on accident. Secondly, and I'm not advocating for better viruses, but would a kill switch that the owner had exclusive controle over not be possible? They went to great lengths coding this but left the kill switch free for anyone to use.
@blancomation554
@blancomation554 5 жыл бұрын
subbed, 22 minutes passed like a breeze
@bekircandal3528
@bekircandal3528 5 жыл бұрын
Subbed instantly.Cant wait for another episodes.
@THExBOSSxKSA
@THExBOSSxKSA 5 жыл бұрын
I'm so happy that KZbin recommended this video to me. Keep up the good work! Waiting for part 2..
@stacksmashing
@stacksmashing 5 жыл бұрын
Hopefully tomorrow :) life has been busy
@anuragC819
@anuragC819 5 жыл бұрын
KZbin algo has done it again. Could understand probably 1% of what was talked about, but it seemed very interesting. Subscribed!
@ImXyper
@ImXyper 4 жыл бұрын
imagine doing this and accidentally running wannacry. i would actually scream
@watema3381
@watema3381 3 жыл бұрын
**laughs in multiple VMs running in Arch Linux** i use arch btw
@bigbythebigbadwolf8612
@bigbythebigbadwolf8612 3 жыл бұрын
@@watema3381 no one cares
@watema3381
@watema3381 3 жыл бұрын
@@bigbythebigbadwolf8612 aparently you do cause you replied! also (incase you haven't noticed), it's an inside joke
@bigbythebigbadwolf8612
@bigbythebigbadwolf8612 3 жыл бұрын
@@watema3381 still no one cares
@bigbythebigbadwolf8612
@bigbythebigbadwolf8612 3 жыл бұрын
@@medo7dody ur prob crying behind ur screen: i dont care either but i gotta be an edgy loser so i can prove this guy wrong
@weaver3636
@weaver3636 5 жыл бұрын
I honestly didn't understand a single thing but I still appreciate the video, so thanks for sharing this. I wonder who was behind the attack. It pisses me off there was nothing I could do to help when it happened to my relatives.
@fatfr0g570
@fatfr0g570 4 жыл бұрын
It might be finger pointing, but the US, UK, and Australia claimed that North Korea was behind the attack.
@hiddenaether
@hiddenaether Жыл бұрын
@@fatfr0g570 they formally asserted its origin as North Korea, the only 2 instruction pages not machine translated were english and chinese. more interestingly, the developers computers had Korean font families installed and build stamps indicated their timezone.
@BGroothedde
@BGroothedde 5 жыл бұрын
Amazing video, very good to follow and it helped me a lot with some frustrating 'features' in Ghidra. I found I was using the disassembler window more than the decompilation window because of weird decompilation results - you helped me understand getting better decompilation results by adjusting Ghidra's interpretation of some code. Thanks!
@stacksmashing
@stacksmashing 5 жыл бұрын
That's awesome to hear, thank you! Feel free to let me know what else you have trouble with, maybe it's something I can feature in the future
@BGroothedde
@BGroothedde 5 жыл бұрын
@@stacksmashing I'll be sure to comment it when I find more stuff, but seeing you work already solves a lot of problems!
@manuellopes1269
@manuellopes1269 5 жыл бұрын
@@stacksmashing greaat tut, can please explain if possible im chrome devtools save the changes i make in offline? i want change a pwa web worker app that works online and offline but the changes i made nolt save when i restart the app, exist any trick to save?if i not save i only get the cache of pwa app and not possible open and edit i think, thanks
@i3130002
@i3130002 5 жыл бұрын
Man, I used to debug exe using ollydebug and you are taking it to another level 🤯
@WindBringsMemories
@WindBringsMemories 5 жыл бұрын
Nice tutorials man! Maybe some basics for reverse engineering video's in Ghidra would be great as well! Like explaining how the system works and what each action truly means :). But it's great :) Can't wait for the next one.
@xmesaj2
@xmesaj2 5 жыл бұрын
I don't really know what's going on because Im noob but these videos are cool, this is the best and practical approach I've seen I think, loving it and subbed immadietely, good commentary, step by step. Waiting for more.
@sanderspeetjens
@sanderspeetjens 5 жыл бұрын
Looks good want to see the following episode. Reverse engineering seems pretty fun.
@CorporateSeltzer
@CorporateSeltzer 5 жыл бұрын
I came across your channel shortly after downloading Ghidra. I appreciate how you clearly detail your train of thought in each video. I hope to see more!
@osamazaid25
@osamazaid25 5 жыл бұрын
Wow this is very impressive! Great job & keep going :)
@drakibble2199
@drakibble2199 5 жыл бұрын
Hey, I love watching reverse engineering videos! Thank you for this one. I'm glad that the KZbin recommendation bots have blessed you.
@xXWipeout4Xx
@xXWipeout4Xx 5 жыл бұрын
Interesting and good video. Reverse engineering and programming isn't really my thing and a lot of it is going over my head. But it's an interesting and informative video none the less. Waiting to see part 2!
@better-break-bad-edits
@better-break-bad-edits 3 жыл бұрын
Parents: Install obvious virus that slows down the computer. Parents: It must be that Steam thing.
@jeromecabarus6893
@jeromecabarus6893 5 жыл бұрын
you have finally cracked the 'WannaCry'' virus! I'm Impressed
@PASTRAMIKick
@PASTRAMIKick 5 жыл бұрын
I used the GNU debugger to reverse engineer some stuff, but with more complex programs it gets harder, this seems make things more agile and clear
@bancodrut
@bancodrut 5 жыл бұрын
Might be just Ghidra making it seem too easy 😃
@sodicious
@sodicious Жыл бұрын
i dont know what you are saying but i think this is very great
@Frankie_Freedom
@Frankie_Freedom 5 жыл бұрын
Wow... as difficult as all this sounds, I'm a new security enthusiast, so I'm still learning. I was able to understand and somewhat follow what you were doing. kudus.
@freeweed4all
@freeweed4all 5 жыл бұрын
Using an open source reversing platform like Ghidra, everyone could potentially come closer to the reversing world. Oh what if I could be some years younger..
@Decentsito
@Decentsito 5 жыл бұрын
what do you mean years younger
@freeweed4all
@freeweed4all 5 жыл бұрын
@@Decentsito I'm too old to start studying in depth reversing, now.
@VictorNascimentoo
@VictorNascimentoo 5 жыл бұрын
No one is too old to learn.
@medvfx3370
@medvfx3370 5 жыл бұрын
@@freeweed4all how old are you?
@freeweed4all
@freeweed4all 5 жыл бұрын
@@UCnPE-cqd00o5SHPn0rHxphg thanks for the support. I made a choice some years ago, leaving netsec to start studying at University a totally different thing: knowing today how this sector is growing, maybe my choice wasn't the right one. Today, with these excellent resources, is far more easy to fill the gap with skilled reversing ppl: some years ago they appear like a part of a niche, like an out of reach status. This effect is an outcome of how much the reversing job offers are growing (US government choice about Ghidra isn't random).
@aibh7903
@aibh7903 5 жыл бұрын
I’m trying to learn Ghidra and reverse engineering in general, and this and your other videos are so helpful.
@awabomer
@awabomer 5 жыл бұрын
So fast and accurate like a real ninja 😂, nice video , I didn't have to use speed 2 , like I usually do 😂
@Pyritenite
@Pyritenite 5 жыл бұрын
Well, I dont really understand well but Im here to understand it better, thanks for the video! Edit: i actually managed to understand a part of it
@oleksiit2156
@oleksiit2156 5 жыл бұрын
Best video i ever seen on reverse engineering, keep it easy to understand! Thank you.
@Yz0x
@Yz0x 4 жыл бұрын
Your skills are unbelievable. Good job 👏🏼
@kinershah464
@kinershah464 Жыл бұрын
Very good video. Thanks for this video. That flowchart was helpful too. I have never seen reverse engineering in practice, this was very interesting. Very similar to debugging programs only here we don't have symbol information and have to create our own symbols, but it seems this Ghidhra tool makes things a lot convenient. Whoever wrote this malware must have very good knowledge of Windows API, maybe even about Windows kernel.
@Defyyyy1
@Defyyyy1 5 жыл бұрын
Keep up the amazing work you do with your videos!
@Nightsd01
@Nightsd01 10 ай бұрын
Imagine how difficult this would have been if they had obfuscated their binary, adding thousands of false paths that don’t actually lead anywhere
@Chillieman
@Chillieman Жыл бұрын
Dude!! This is an epic walkthrough of reverse engineering - SO INTERESTING!!
@Kaplan0644
@Kaplan0644 5 жыл бұрын
Very nice video, thank you. I would definitely want to see more malware analysis with ghidra videos. :)
@MrCollyTV
@MrCollyTV 5 жыл бұрын
Thanks for the great work! Can't wait for a part 2
@prerunning6086
@prerunning6086 5 жыл бұрын
Awesome video looking fwd to part 2
@CrovaxHD
@CrovaxHD 4 жыл бұрын
i'm ignorant as a goat about this, but i find this voice quite relaxing and soothing
@amandamate9117
@amandamate9117 5 жыл бұрын
what kind of machine is this youtuber? jesas fck this fast and accurate analysis makes my head xplode
@stacksmashing
@stacksmashing 5 жыл бұрын
Reported and removed, there is no room for stuff like this on here :)
@urugulu1656
@urugulu1656 5 жыл бұрын
@@stacksmashing and also not for the answer of that other random guy calling the guy in the already deleted comment a waste of Oxygen. not all People are capable of following this type of Content not even developers that are already programming for a very long time. i guess in this case calling you a "machine" is somewhat of a compliment although a rather dubious one.
@chriswright1389
@chriswright1389 5 жыл бұрын
@@urugulu1656 Did you see the comment that I was replying to. It had nothing to do with the video and was just an unprovoked attack on someone minding their own business.
@msinfo32
@msinfo32 5 жыл бұрын
@@stacksmashing what
@MsAsssde
@MsAsssde 4 жыл бұрын
you would NEVER make a good REV eng... your observation skills are poor... 1. Tool bar top (NOT windows), OSX or linux 2. Apple logo top left 3. APPLE finder logo left tool bar top
@VRWarehouse
@VRWarehouse 4 жыл бұрын
Wow, part 2 please
@anonpy6638
@anonpy6638 Жыл бұрын
Si entendiera inglés y lo que haces me encantaría seguir lo que haces. Mis ojos se quedaron atrapados cuando vi este video al parecer lo había visto antes y no comenté. .Mis respetos hombre.
@tcocaine
@tcocaine 5 жыл бұрын
Really well done video. I think you should keep this series in this format. Personally I like the pacing of the video, and wouldn't want it slower, or faster.
@samyuj
@samyuj 5 жыл бұрын
Thanks man! Great content!! Definitely looking forward to more!! All the best!!
@lilrich1243
@lilrich1243 4 жыл бұрын
Thanks to solo learn the C++ and the python course I understand the basic functions. I just need to finish the modules for both and I'll be able to understand this a lot better
@elliotmason681
@elliotmason681 5 жыл бұрын
Thank you for your videos!!
@powerfrog3688
@powerfrog3688 5 жыл бұрын
I almost fell asleep watching this video just because of this guy's beautiful asmr voice
@snowcold903
@snowcold903 5 жыл бұрын
This is very interessting! Can't wait for part 2. Have discovered these malwares before, but fortunately it was on a computer with no important stuff on it. One question, are you really using mac osx or is this linux with mac os x skin ??
@drozcan
@drozcan 5 жыл бұрын
Nope this is macOS
@muff1n1634
@muff1n1634 5 жыл бұрын
it's macOS 2: electric boogaloo (system-wide dark theme included) get your copy today and save 50% off the normal cost!
@paprika5487
@paprika5487 5 жыл бұрын
man, this was a trip
@MusiclyJorge
@MusiclyJorge Жыл бұрын
Video started normally until he opened Ghidra... Then he suddenly started to talk Gibberish :)
@hunterlepage
@hunterlepage Жыл бұрын
I dont know C or C++ or whatever is on the right, but at least i understand whats going on in the assembly code
@Zayetzo
@Zayetzo Жыл бұрын
Reminds me when I reverse engineered a program that communicated with certain peripherals to try to understand how that obscure peripheral worked. No information online except for the program itself at hand.
@tissuepaper9962
@tissuepaper9962 5 жыл бұрын
I swear I thought this video had only been five minutes long when it ended.
@Drakestophet
@Drakestophet 3 жыл бұрын
The creators of WannaCry must have been geniuses like this guy
@recklessroges
@recklessroges 5 жыл бұрын
I am looking forward to the next video. (Should you encrypt the copy of Wannacry on your website using the AES key in your previous video? That would protect script kiddies from themselves and create a nice easter egg/crackme challenge?)
@221Gregor
@221Gregor 5 жыл бұрын
Again your videos are insanely good !!! Love it !
@TheMadMagician87
@TheMadMagician87 5 жыл бұрын
Thanks for your videos, great detail. I hope you carry on with this channel and it's content.
@TheChemicalWorkshop
@TheChemicalWorkshop 4 жыл бұрын
Debugging and decompiling is so fucking hard, it's like backwards coding... Great job!
@voDKaandEric
@voDKaandEric 3 жыл бұрын
you make me realise how little I know about anything. Great video
@strategycube770
@strategycube770 5 жыл бұрын
When I see a new video, I just have to find out what you’ve done with Ghidra.
@Twisted_Code
@Twisted_Code 3 жыл бұрын
I was flying by the seat of my pants for most of this video, but I had JUST enough experience with C/C++ from college to follow MOST of what's going on? Good thing there are better geeks than me that were on top of this thing before it could do... more damage than it did... and props to the guy that accidentally found the kill switch :-)
@ihabmb8960
@ihabmb8960 5 жыл бұрын
Great video. Waiting for the next part
@37Kilo2
@37Kilo2 7 ай бұрын
This thing was hitting so many local places in my hometown. The school system, the police station. All of their systems were locked. And they paid up. Lol.
@damienw4958
@damienw4958 5 жыл бұрын
Wow, I learnt so much about decompilation in this video! Thanks, keep it up!
@nasserghoseiri4934
@nasserghoseiri4934 5 жыл бұрын
This is some quality work! Congrats...
@LiEnby
@LiEnby 5 жыл бұрын
Wow you do that so fast xD hmm very informative video and i learnt a bit about reverse engineering
@ha2kiplt
@ha2kiplt 10 ай бұрын
I ve no idea what he is doing but I’m very impressed
@vengefulgod_
@vengefulgod_ 4 жыл бұрын
Great work and love what you did to show us how to reengineer a malware program like wanna cry I am in discord and on htb trying everything I can do to learn this so thank you and this is very helpful
@jbossman008
@jbossman008 5 жыл бұрын
That was elite. Way to go!
@youtube_bat3811
@youtube_bat3811 Жыл бұрын
this is the video that helped me learn how to reverse engineer, thank you
@meemkoo
@meemkoo Жыл бұрын
Imma be honest im just a python programmer with a little bit of experencine in rust. So even thouh i had a very vauge idea of what you were doing and having a somewhat good understanding of reverse engineering i still enjoyed it and kind of put it on as just some white noise in to do some linux stuff. Nice video!
@RonShaders
@RonShaders Жыл бұрын
i don't know much about what you are doing but you earn a new subscriber here
@Fear594
@Fear594 3 жыл бұрын
accidentally ran this on my pc a few years ago, good thing i was in a call with my friend because we closed it out in task manager before it could do all of its damage lol
@justone4272
@justone4272 3 жыл бұрын
"if you have ever reverse engineered"- Nope, I can't even figure out how to pull up the terminal.
@oscarlevipaguada
@oscarlevipaguada 5 жыл бұрын
Can’t wait for part 2
@abraksas14
@abraksas14 3 жыл бұрын
"let's jump into the function" sounds kinda cute to my german ears :)
@YLCao
@YLCao 11 ай бұрын
Great video! Looking forward to more of your videos on Ghidra reverse engineering!
@miroslav1845
@miroslav1845 5 жыл бұрын
Damn, this is how genius sounds like
@Jell0zz
@Jell0zz 5 жыл бұрын
This looks very interesting, great analysis, even for laymen.
@stefm.w.3640
@stefm.w.3640 3 жыл бұрын
learned more about programming from this video than from one year of college 😂
@nezu_cc
@nezu_cc 5 жыл бұрын
Awesome work as always. Keep it up
@popkahchin
@popkahchin 5 жыл бұрын
I think you should make a throughout tutorials on hacking from 0 to advanced level. It would bring you even more views and many supporters will come too.It not only helps people know more about cyber security but also benefit you as well. Of course, you have to explain it in a simpler and easy ways so that beginners like us can understand and people will stick around. A lot of tutorials are either too complicated from the beginning or It just asks people to sign up some kind of paid programs etc.. This is not what we want.
@MrHockeyNation
@MrHockeyNation 5 жыл бұрын
You can’t just watch video and expect to become a hacker. Strong programming skills make for great hackers, but you need to learn the basics first.
@popkahchin
@popkahchin 5 жыл бұрын
@@MrHockeyNation I am not saying that I expect to become a pro hacker just by watching videos. I am talking about providing complete tutorials for people from any sort of level like one of those courses that you can take from udemy but this will be free. Just a suggestion for him nothing more. If he wants to do it then great, if not then it is not a big deal
@MrHockeyNation
@MrHockeyNation 5 жыл бұрын
@@popkahchin Oh yeah of course, but videos are hard to follow and you should get yourself at the very least a basic understanding of programming, and to be more efficient, learn about more advanced programming techniques to make it worth your time.
@tehdrek
@tehdrek 5 жыл бұрын
Awesome! Making a scary subject seem doable.
@VoKuHiLaMan
@VoKuHiLaMan 5 жыл бұрын
awesome video! I'd love to see more!
@techguy921
@techguy921 3 жыл бұрын
Why virus exe is in a plain code? No themida or vmprotect
@mnodhe
@mnodhe 9 ай бұрын
best I've seen till now
Reversing WannaCry Part 2 - Diving into the malware with #Ghidra
15:48
How the Apple AirTags were hacked
8:38
stacksmashing
Рет қаралды 1,6 МЛН
🍉😋 #shorts
00:24
Денис Кукояка
Рет қаралды 3,3 МЛН
Brawl Stars Edit😈📕
00:15
Kan Andrey
Рет қаралды 55 МЛН
Which One Is The Best - From Small To Giant #katebrush #shorts
00:17
When you Accidentally Compromise every CPU on Earth
15:59
Daniel Boctor
Рет қаралды 827 М.
Learn Reverse Engineering (for hacking games)
7:26
cazz
Рет қаралды 1 МЛН
Wana Decrypt0r (Wanacry Ransomware) - Computerphile
15:19
Computerphile
Рет қаралды 1,5 МЛН
Self-Learning Reverse Engineering in 2022
9:09
LiveOverflow
Рет қаралды 385 М.
hacker:HUNTER - Wannacry: The Marcus Hutchins Story - All 3 Chapters
25:11
Tomorrow Unlocked
Рет қаралды 1,7 МЛН
I Tested Malware Against Antiviruses
12:02
Crypto NWO
Рет қаралды 1,3 МЛН
How to know if your PC is hacked? Suspicious Network Activity 101
10:19
The PC Security Channel
Рет қаралды 1,3 МЛН
PRACTICAL REVERSE ENGINEERING
6:13
aXXo
Рет қаралды 62 М.
Is your PC hacked? RAM Forensics with Volatility
14:29
The PC Security Channel
Рет қаралды 912 М.
🍉😋 #shorts
00:24
Денис Кукояка
Рет қаралды 3,3 МЛН