Reverse engineering enhances the understanding of both programming thought and skills. This video is easy to follow, and the main techniques of reverse engineering are shown clearly, which makes me want to decompile a small interesting program to analyze it.
@wanderingpalace4 жыл бұрын
安笑生 yeah we can learn programming from reverse engineering stuffs 你好同志
@r0x3043 жыл бұрын
lol
@ADeeSHUPA2 жыл бұрын
@@wanderingpalace 安笑生
@gameacc6079 Жыл бұрын
@@wanderingpalace i love xi jinping's huge cawk
@muth69 Жыл бұрын
@@wanderingpalace no you absolutely can't
@lynx53275 жыл бұрын
I'm a vegetable that doesn't understand anything but this was an interesting video
@GamerTheTurtle5 жыл бұрын
@@ayylmaoglow takes one to know one! unless you're a reptilian
@ThisDaveAndThatJohn5 жыл бұрын
read the book Code by Charles Petzold. You will understand how the CPU and assembler works even if you are a total noob. After that you will automatically understand how programming languages work, reverse engineering too and so on.
@ThisDaveAndThatJohn5 жыл бұрын
@Rajath Pai trust me. Petzold is a guru
@zxxczczczcz5 жыл бұрын
@@ThisDaveAndThatJohn code by charles petzold?
@HimanshuPal-li7nj5 жыл бұрын
Ok BOOMER
@SouravTechLabs5 жыл бұрын
Looks like Ghidra is a very good renaming tool!
@vladysmaximov61564 жыл бұрын
I prefer ollydbg 2.01 or x64dbg for 64 bit, ghidra makes really easy the reverse process, can get a source code... I prefer analyze asm instructions one by one for understand fully process but this isn't the best stategy.. one by one can take you a lot of time i use call stack window for locate specific part i want to analyze!
@aasquared81914 жыл бұрын
@@vladysmaximov6156 keep us posted mate
@Luzum4 жыл бұрын
@@vladysmaximov6156 weird flex but ok
@madghostek30264 жыл бұрын
@@vladysmaximov6156 I tried out ghidra and improved my performance like 10 times (mainly due to being shit in reading asm fast).
@jonarmani86544 жыл бұрын
@@vladysmaximov6156 You absolute pleb. Version 1.10 or GTFO.
@l2ubio5 жыл бұрын
"Microsoft security center (2.0) sevice" LMAO
@tomasviane38445 жыл бұрын
I didn't understand anything of what you did, but the casualness of explaining something so exoticly complicated drew me in.
@_nit4 жыл бұрын
Wow that was probably one of the best descriptive reverse engineering videos I've seen to date. Your method of explaining and showcasing each step in each function is fantastic and even explaining how to identify when disassemblers/decompilers mess up and how to fix them. Bravo. I'm upset that I waited this long to actually start watching these videos.
@vasilysu4 ай бұрын
Fully agree, amazing video! Simple step by step explanation is excellent!
@dd123325 жыл бұрын
You know too many things. You explain it too casually like it's food lmao. This guy be like: Ok, let me present you my house.
@lionkor985 жыл бұрын
hijacking this to say WE NEED PART 2
@User-ko3un4 жыл бұрын
Inserts his too powerful(smart) to be kept alive meme*
@acc373r4t0r4 жыл бұрын
looks pretty standard to me
@NanoValorant4 жыл бұрын
Plot twist: he is the hacker who made wanna cry
@brunph61744 жыл бұрын
marv b first 20 minutes is really basic stuff. Its just general reversing and assigning names
@MrMasterRhythm5 жыл бұрын
Love this! Please create a series of Reverse Engineering Basics!
@oliviasmith46805 жыл бұрын
Yes
@MattZelda5 жыл бұрын
Just gotta learn GDB, Radare, OllyDBG for Windows, and assembly. And even then the assembly is the part that while takes the longest isn't too bad once you get used to it.
@MattZelda5 жыл бұрын
Oh and IDA / Binary Ninja are good too.
@andrasfogarasi50145 жыл бұрын
Reading the WannaCry warning, the creaters were real lads, providing multiple languages, information about BitCoin and a contact method. They just sound incredibly kind.
@gabe62785 жыл бұрын
tbh, i think they knew that they would affect millions of devices. humble people
@SteppingStonevlogs3 жыл бұрын
Kind, maybe not, but they were reasonable. Do as we ask and we promise all will be well. And see we have written in clear language what we want you to understand. Give us the money and have a nice day 😊
@kahlzun Жыл бұрын
professionals have *standards*
@hiddenaether Жыл бұрын
cant get money from someone who cant understand what they are reading
@ryannorthup3148 Жыл бұрын
@@kahlzun Investigations show that this was most likely an attack by the North-Korean Government-Controlled Lazarus hacking group to fund nuclear programs and Fatass Jong Un's Sanction-Bypassing Goldschlager run. Eh, probably not Goldschlager. The fatass is probably going for something more expensive.
@traida1113 жыл бұрын
The thing that blew my mind the most, was the list of language translations you found in the passworded zip. Made me realize how much they really scaled this thing to take on the world. Absolute savage. Who ever did this was well organized. Do you ever wonder if they watched this video?
@hiddenaether Жыл бұрын
they make locale translators for batch translating, prob took them about 5 minutes to translate all locales. The least impressive part
@traida111 Жыл бұрын
@@hiddenaether then why hide it with such levels of encryption? it would be easy to just use english, but instead they have the ambition to take on the world.
@TheDankTiel5 жыл бұрын
I understood everything except for the renaming parts. Meaning i did not understand a thing. Cool vid tho, you've earned a sub!
@_ahmedkira5 жыл бұрын
Ghidra ninja:The function is very simple Me:
@i-use-arch-btw39545 жыл бұрын
WannaCry: exists Ghidra: im about to end this mans whole carrer
@xyphoes3455 жыл бұрын
what the H E C C is a carrer
@glowingone17745 жыл бұрын
@@xyphoes345 it's a carrer
@xyphoes3455 жыл бұрын
@@glowingone1774 isnt it meant to be a *career* tho
@glowingone17745 жыл бұрын
@@xyphoes345 no this is much different.
@quaintfalopa97245 жыл бұрын
but wannacry isnt a man
@rubenco12535 жыл бұрын
I am currently doing my bachelor in Computer Science and didn't know this reverse engineering even existed! Very cool and very nicely explained. Showing the keyboard output is also a nice addition of you! Thanks :)
@elijahburnham78824 жыл бұрын
RubenCO what language is this in?
@Slenderman63323 Жыл бұрын
@@elijahburnham7882 The left side of Ghidra is x86 Assembly and the right side is C.
@hjrgf9 ай бұрын
@@Slenderman63323you need low level knowledge to be able to do stuff like this since the c code that is outputed is very low level
@saeedmahmoodi72114 жыл бұрын
first time i watched this about 2 year ago and i was a simple java programer now i am a c/c++ programming working at a hardware developing company and i just watched this again that was awesome , i finally understood what was u talking about , i am always checking u tube for part 2 please upload it i am tried :)
@anuragC8195 жыл бұрын
KZbin algo has done it again. Could understand probably 1% of what was talked about, but it seemed very interesting. Subscribed!
@georgedomse5 жыл бұрын
Just wow. Impressive job! I hope you are employed by one of the major tech/AV companies.
@funnypallu5 жыл бұрын
I am just happy that there are people out there who understand stuff like this! 😅
@sebastienducasse9345 жыл бұрын
Very interesting and complete video, first time I watch a reversing engineering video and I love the way you investigate and explain what you do. It's the first video of your channel I see and I love it. Keep going !
@saadeddhaher17064 жыл бұрын
everyone: try not downloading files from entrusted places!!! Ghidra: let's unpack the malware !
@naxzed_it4 жыл бұрын
@starshipeleven He could use a VM.
@brunoeilhart85164 жыл бұрын
What is an entrusted place?
@fatfr0g5704 жыл бұрын
starshipeleven presumably you download the sample from within the VM, then disable the Ethernet adapter that gives the VM Internet access to prevent worms from going through the connection.
@fatfr0g5704 жыл бұрын
starshipeleven forgot about that option, thanks for reminding me.
@yaelm6314 жыл бұрын
Just something that scares me : They are easy accessible websites to download loads of virus to try antivirus and understanding how they work ? I hope they tell the user several warnings before sending the file
@ThoughtinFlight5 жыл бұрын
This was SUPER interesting and well made, please continue! You left us on a cliffhanger!
@THExBOSSxKSA5 жыл бұрын
I'm so happy that KZbin recommended this video to me. Keep up the good work! Waiting for part 2..
@stacksmashing5 жыл бұрын
Hopefully tomorrow :) life has been busy
@BernhardMillauer5 жыл бұрын
That was very insightful! I'm a software developer/architect for 17 years now and I must say that you have a very nice way to tell details and to guide your audience. thank you very much! for the follow up video I would like to see the "physical" impact of the malware, like show the registry-key or the installation folder to make it more understandable for non-developers.
@not_glad9 ай бұрын
I have a few questions. I've done vb coding for years, but more as a supplement to my other work loads, I'm not a full blown dev. First, what was so hard about spotting the kill switch? There must have been a lot of the best devs looking at this code globally for 4 days, the guy who killed it even did that on accident. Secondly, and I'm not advocating for better viruses, but would a kill switch that the owner had exclusive controle over not be possible? They went to great lengths coding this but left the kill switch free for anyone to use.
@dawnv34365 жыл бұрын
Ghidra looks like an EXCELLENT tool to manage an RE session. Top notch.
@bence0302bence5 жыл бұрын
Abra, Kadabra, Alakazam, You now possess a new subscriber, Simsalabam.
@xmesaj25 жыл бұрын
I don't really know what's going on because Im noob but these videos are cool, this is the best and practical approach I've seen I think, loving it and subbed immadietely, good commentary, step by step. Waiting for more.
@CorporateSeltzer5 жыл бұрын
I came across your channel shortly after downloading Ghidra. I appreciate how you clearly detail your train of thought in each video. I hope to see more!
@jed8335 жыл бұрын
Fantastic Video, I hope to see more both on wannacry and other things soon. As an embedded SW guy looking to get into RE this was great.
@i31300025 жыл бұрын
Man, I used to debug exe using ollydebug and you are taking it to another level 🤯
@bluenightsky4 жыл бұрын
I have no idea what's gong on here, but I'm straining to understand. Great video!
@BGroothedde5 жыл бұрын
Amazing video, very good to follow and it helped me a lot with some frustrating 'features' in Ghidra. I found I was using the disassembler window more than the decompilation window because of weird decompilation results - you helped me understand getting better decompilation results by adjusting Ghidra's interpretation of some code. Thanks!
@stacksmashing5 жыл бұрын
That's awesome to hear, thank you! Feel free to let me know what else you have trouble with, maybe it's something I can feature in the future
@BGroothedde5 жыл бұрын
@@stacksmashing I'll be sure to comment it when I find more stuff, but seeing you work already solves a lot of problems!
@manuellopes12695 жыл бұрын
@@stacksmashing greaat tut, can please explain if possible im chrome devtools save the changes i make in offline? i want change a pwa web worker app that works online and offline but the changes i made nolt save when i restart the app, exist any trick to save?if i not save i only get the cache of pwa app and not possible open and edit i think, thanks
@SullySadface3 жыл бұрын
I don't know shit about coding, but you've explained this in a very human-readable way and i appreciate that.
@Elffi5 жыл бұрын
Ghidra: *does windows reverse engineering in iOS* Windows: "Am I a joke to you?"
@rohitas20505 жыл бұрын
macOS*
@Elffi5 жыл бұрын
@@rohitas2050 woops
@Juppie9024 жыл бұрын
more like Reclass: Am I a Joke to you ?
@smwfreak16474 жыл бұрын
@@Elffi LOL
@weaver36365 жыл бұрын
I honestly didn't understand a single thing but I still appreciate the video, so thanks for sharing this. I wonder who was behind the attack. It pisses me off there was nothing I could do to help when it happened to my relatives.
@fatfr0g5704 жыл бұрын
It might be finger pointing, but the US, UK, and Australia claimed that North Korea was behind the attack.
@hiddenaether Жыл бұрын
@@fatfr0g570 they formally asserted its origin as North Korea, the only 2 instruction pages not machine translated were english and chinese. more interestingly, the developers computers had Korean font families installed and build stamps indicated their timezone.
@sanderspeetjens5 жыл бұрын
Looks good want to see the following episode. Reverse engineering seems pretty fun.
@xoxo-sf1zg5 жыл бұрын
First time KZbin recommended me something amazing. 😀
@WindBringsMemories5 жыл бұрын
Nice tutorials man! Maybe some basics for reverse engineering video's in Ghidra would be great as well! Like explaining how the system works and what each action truly means :). But it's great :) Can't wait for the next one.
@blancomation5545 жыл бұрын
subbed, 22 minutes passed like a breeze
@Frankie_Freedom5 жыл бұрын
Wow... as difficult as all this sounds, I'm a new security enthusiast, so I'm still learning. I was able to understand and somewhat follow what you were doing. kudus.
@tcocaine5 жыл бұрын
Really well done video. I think you should keep this series in this format. Personally I like the pacing of the video, and wouldn't want it slower, or faster.
@muzammilbutt205 жыл бұрын
Would love to see a tutorial on TP-Link router firmware RE or firmware with similar architecture, reverse engineering and rebuild of the firmware. Love your videos so far.
@xXWipeout4Xx5 жыл бұрын
Interesting and good video. Reverse engineering and programming isn't really my thing and a lot of it is going over my head. But it's an interesting and informative video none the less. Waiting to see part 2!
@khatharrmalkavian33063 жыл бұрын
I wouldn't mind doing that for a living. It seems like the sweet spot between meditative focus, puzzle solving, and education.
@Slenderman63323 Жыл бұрын
Trust me, it gets old fast.
@hiddenaether Жыл бұрын
@@Slenderman63323 Nahh, things are constantly changing which keeps it interesting. Unless you dont know what youre doing or looking at then yeah, I could see it getting "old fast"
@PASTRAMIKick5 жыл бұрын
I used the GNU debugger to reverse engineer some stuff, but with more complex programs it gets harder, this seems make things more agile and clear
@bancodrut5 жыл бұрын
Might be just Ghidra making it seem too easy 😃
@drakibble21995 жыл бұрын
Hey, I love watching reverse engineering videos! Thank you for this one. I'm glad that the KZbin recommendation bots have blessed you.
@kinershah464 Жыл бұрын
Very good video. Thanks for this video. That flowchart was helpful too. I have never seen reverse engineering in practice, this was very interesting. Very similar to debugging programs only here we don't have symbol information and have to create our own symbols, but it seems this Ghidhra tool makes things a lot convenient. Whoever wrote this malware must have very good knowledge of Windows API, maybe even about Windows kernel.
@BekircanDAL5 жыл бұрын
Subbed instantly.Cant wait for another episodes.
@aibh79035 жыл бұрын
I’m trying to learn Ghidra and reverse engineering in general, and this and your other videos are so helpful.
@kripposoft5 жыл бұрын
This was super interesting. Please continue with this series
@Yz0x4 жыл бұрын
Your skills are unbelievable. Good job 👏🏼
@awabomer5 жыл бұрын
So fast and accurate like a real ninja 😂, nice video , I didn't have to use speed 2 , like I usually do 😂
@yegnasivasai5 жыл бұрын
I didn't understand single bit of information u said but I watched full video..and subscribed.. Thanks for making this video
@osamazaid255 жыл бұрын
Wow this is very impressive! Great job & keep going :)
@recklessroges5 жыл бұрын
I am looking forward to the next video. (Should you encrypt the copy of Wannacry on your website using the AES key in your previous video? That would protect script kiddies from themselves and create a nice easter egg/crackme challenge?)
@chrisrider9635 жыл бұрын
Great video! Thank you! When will part 2 be released?
@CrovaxHD4 жыл бұрын
i'm ignorant as a goat about this, but i find this voice quite relaxing and soothing
@fatihgul775 жыл бұрын
Thank you. Really enjoy and learn much from your videos. Does Ghidra is best in reverse engineering or do you advise another tool/program?
@stacksmashing5 жыл бұрын
It's a great one for sure, but does not yet have a debugger (though supposedly it'll be released soon). There are lots of tools: - Radare2 (and Cutter as its UI) - opensource & free - Retdec decompiler - opensource & free - IDA Pro + Hex-Rays decompiler (Expensive, a free version is available of IDA though) - de-facto industry standard etc :) I am very impressed with Ghidra for non x86/x64 stuff, so I like it so far! But as you can see in this video, the decompiler really isn't the best for x86/Windows
@oleksiit21565 жыл бұрын
Best video i ever seen on reverse engineering, keep it easy to understand! Thank you.
@Chillieman Жыл бұрын
Dude!! This is an epic walkthrough of reverse engineering - SO INTERESTING!!
@anonpy6638 Жыл бұрын
Si entendiera inglés y lo que haces me encantaría seguir lo que haces. Mis ojos se quedaron atrapados cuando vi este video al parecer lo había visto antes y no comenté. .Mis respetos hombre.
@Kaplan06445 жыл бұрын
Very nice video, thank you. I would definitely want to see more malware analysis with ghidra videos. :)
@D3ltaLabs5 жыл бұрын
I'm looking forward to the second part to this series..
@Defyyyy15 жыл бұрын
Keep up the amazing work you do with your videos!
@LookeyPL5 жыл бұрын
Very informative and interesting video. Thanks for that amazing upload! I cannot wait to see its continuation.
@jeromecabarus68935 жыл бұрын
you have finally cracked the 'WannaCry'' virus! I'm Impressed
@Pyritenite5 жыл бұрын
Well, I dont really understand well but Im here to understand it better, thanks for the video! Edit: i actually managed to understand a part of it
@sodicious Жыл бұрын
i dont know what you are saying but i think this is very great
@Yumikitsu5 жыл бұрын
I didn't understand anything, but I would have loved to cause it seems like a very useful skill to have and props to you for being so good at it!
@snowcold9035 жыл бұрын
This is very interessting! Can't wait for part 2. Have discovered these malwares before, but fortunately it was on a computer with no important stuff on it. One question, are you really using mac osx or is this linux with mac os x skin ??
@drozcan5 жыл бұрын
Nope this is macOS
@muff1n16345 жыл бұрын
it's macOS 2: electric boogaloo (system-wide dark theme included) get your copy today and save 50% off the normal cost!
@Miodex695 жыл бұрын
Keep doing this. Show the world sth more about WannaCry.
@voDKaandEric3 жыл бұрын
you make me realise how little I know about anything. Great video
@prerunning60865 жыл бұрын
Awesome video looking fwd to part 2
@YLCao Жыл бұрын
Great video! Looking forward to more of your videos on Ghidra reverse engineering!
@Drakestophet4 жыл бұрын
The creators of WannaCry must have been geniuses like this guy
@aerglass98162 жыл бұрын
this is the only guy who can decrypt wannacry without paying it lol
@powerfrog36885 жыл бұрын
I almost fell asleep watching this video just because of this guy's beautiful asmr voice
@amandamate91175 жыл бұрын
what kind of machine is this youtuber? jesas fck this fast and accurate analysis makes my head xplode
@stacksmashing5 жыл бұрын
Reported and removed, there is no room for stuff like this on here :)
@urugulu16565 жыл бұрын
@@stacksmashing and also not for the answer of that other random guy calling the guy in the already deleted comment a waste of Oxygen. not all People are capable of following this type of Content not even developers that are already programming for a very long time. i guess in this case calling you a "machine" is somewhat of a compliment although a rather dubious one.
@chriswright13895 жыл бұрын
@@urugulu1656 Did you see the comment that I was replying to. It had nothing to do with the video and was just an unprovoked attack on someone minding their own business.
@msinfo325 жыл бұрын
@@stacksmashing what
@MsAsssde5 жыл бұрын
you would NEVER make a good REV eng... your observation skills are poor... 1. Tool bar top (NOT windows), OSX or linux 2. Apple logo top left 3. APPLE finder logo left tool bar top
@night2night35 жыл бұрын
The video is excellent, I understood most of it with some rudimentary background in programming. I would suggest that after you finish uploading all the videos running through the code, that you upload a 5-10 minute video with just a recap of what you learned and maybe a description of the overall workflow and your thoughts. I think that one would be a lot better for the rest of the 95% of watchers.
@NicoTheCinderace5 жыл бұрын
"This is part 1" *months later*
@bernardokaluza6844 жыл бұрын
6 days ago part 2 was released
@TheChemicalWorkshop4 жыл бұрын
Debugging and decompiling is so fucking hard, it's like backwards coding... Great job!
@RonShaders Жыл бұрын
i don't know much about what you are doing but you earn a new subscriber here
@The21CenturyFox5 жыл бұрын
I hope to be as knowledgeable as you on this topic someday - please make a part 2!
@mend4445 жыл бұрын
Impressed by your work. Keep it up! :D
@ImXyper4 жыл бұрын
imagine doing this and accidentally running wannacry. i would actually scream
@watema33813 жыл бұрын
**laughs in multiple VMs running in Arch Linux** i use arch btw
@bigbythebigbadwolf3 жыл бұрын
@@watema3381 no one cares
@watema33813 жыл бұрын
@@bigbythebigbadwolf aparently you do cause you replied! also (incase you haven't noticed), it's an inside joke
@bigbythebigbadwolf3 жыл бұрын
@@watema3381 still no one cares
@bigbythebigbadwolf3 жыл бұрын
@@medo7dody ur prob crying behind ur screen: i dont care either but i gotta be an edgy loser so i can prove this guy wrong
@samyuj5 жыл бұрын
Thanks man! Great content!! Definitely looking forward to more!! All the best!!
@Twisted_Code3 жыл бұрын
I was flying by the seat of my pants for most of this video, but I had JUST enough experience with C/C++ from college to follow MOST of what's going on? Good thing there are better geeks than me that were on top of this thing before it could do... more damage than it did... and props to the guy that accidentally found the kill switch :-)
@Nightsd01 Жыл бұрын
Imagine how difficult this would have been if they had obfuscated their binary, adding thousands of false paths that don’t actually lead anywhere
@TheMadMagician875 жыл бұрын
Thanks for your videos, great detail. I hope you carry on with this channel and it's content.
@Zayetzo Жыл бұрын
Reminds me when I reverse engineered a program that communicated with certain peripherals to try to understand how that obscure peripheral worked. No information online except for the program itself at hand.
@elliotmason6815 жыл бұрын
Thank you for your videos!!
@LiEnby5 жыл бұрын
Wow you do that so fast xD hmm very informative video and i learnt a bit about reverse engineering
@ihabmb89605 жыл бұрын
Great video. Waiting for the next part
@testplmnb5 жыл бұрын
i wonder if wannacry author watched it :D
@jayzah4 жыл бұрын
Nsa? Of course
@Falaxuper3 жыл бұрын
@@jayzah It was made by North Korean cybercrime organization codenamed 'Lazarus'
@lowrhyan5673 жыл бұрын
It probally have more than 1 author
@DNAofDoggie9 ай бұрын
Wanna Cry's instructions are more impressive than most companies' instructions
@wdai035 жыл бұрын
I thought it was a long time before the kill switch was actually discovered, but it seems here that you uncovered the url 5 mins into the video. Is it really that easy or is it much harder than it looks?
@echdareez5 жыл бұрын
Highly informative! Clearly explained, only understood about half of it but subscribed!!!
@MrCollyTV5 жыл бұрын
Thanks for the great work! Can't wait for a part 2
@In_swedish_the_jam_means_sylt11 ай бұрын
Il take your word for it
@bubblerust Жыл бұрын
i dont know why i watched this but i watched the whole thing
@uri. Жыл бұрын
congrat for the 1M !!! btw i do not understand a thing about the vid