Self-Learning Reverse Engineering in 2022

  Рет қаралды 395,930

LiveOverflow

LiveOverflow

Күн бұрын

Пікірлер: 288
@LiveOverflow
@LiveOverflow 2 жыл бұрын
Sometimes I'm streaming on Twitch: www.twitch.tv/liveoverflow
@mindlab369
@mindlab369 2 жыл бұрын
What kit do I need to purchase to practice Side Channel attacks if I don't want to spend hefty money on xilinx FPGAs?
@jhbonarius
@jhbonarius 2 жыл бұрын
C and especially C++ developers are actually using compiler explorer for _forward_ engineering. I.e. during development they try optimizations there and see what the compiler makes of it, before putting the best version in their code. It's an amazing tool Matt Godbolt brought into the world.
@TheBackyardChemist
@TheBackyardChemist 2 жыл бұрын
Oh absolutely
@SamirPatnaik
@SamirPatnaik 2 жыл бұрын
I hope he gets rich out of it, somehow.
@jhbonarius
@jhbonarius 2 жыл бұрын
@@SamirPatnaik well, not rich no. It's more of a hobby project that has grown out of bounds. But he's become pretty famous in the C++ community.
@user-lb1ib8rz4h
@user-lb1ib8rz4h 2 жыл бұрын
i mean you don't need that tool, you can do the same locally
@OCEAN-fc9wl
@OCEAN-fc9wl Жыл бұрын
Ew c++
@TheBackyardChemist
@TheBackyardChemist 2 жыл бұрын
Step 1: pick a target that is not written in C++ with Boost and Qt and built with O3+LTO...otherwise you will spend months reversing the
@InfiniteQuest86
@InfiniteQuest86 2 жыл бұрын
Lol we've all been there.
@c0smo709
@c0smo709 2 жыл бұрын
@@InfiniteQuest86 no we havent, noob
@InfiniteQuest86
@InfiniteQuest86 2 жыл бұрын
@@c0smo709 Lol! Nice one!
@c0smo709
@c0smo709 2 жыл бұрын
@@InfiniteQuest86 thanks bro appreciate it
@martysh1226
@martysh1226 2 жыл бұрын
@@c0smo709 what a nice and friendly interaction
@martint1775
@martint1775 2 жыл бұрын
If one is interested in Reverse engineering themselves, I would highly recommend the book "Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software". It can be found online using a bit of googling. I just finished a course with the name Reverse Engineering and Malware Analysis and there we used this book. This course was obviously heavily focused on how windows malware works and can be detected through different means, but reverse engineering was a big part of it.
@alalala132whyisthishandletaken
@alalala132whyisthishandletaken 2 жыл бұрын
A more abstract book would be Practical Reverse Engineering by Alexander Gazet and Bruce Dang. Especially if you don't want to go into malware analysis specifically.
@forbiddencake3989
@forbiddencake3989 2 жыл бұрын
Leaving comment for ref. Thanks to you both
@younes3573
@younes3573 2 жыл бұрын
Thx
@alimamulma3sum14
@alimamulma3sum14 2 жыл бұрын
Any link for the course? Thanks.
@chasemedsker
@chasemedsker Жыл бұрын
Bookmark
@diegocastillo6470
@diegocastillo6470 2 жыл бұрын
I started learning assembly code and disassemblers a couple months ago, with the help of the book "Hacking The Art of Exploitation", really good book but the assembly part was really hard of me. I tried to follow on my computer but had many many issues, got frustrated and just let it go. A couple weeks ago I took it upon myself to read it again, and now I got it a little bit better. For some reason assembly is still challenging for me, but no matter how frustrated you get, take some time, breath, stop for a couple hours maybe days and then try to resume. Would have loved to have this video before. Amazing, thank you so much.
@babbalaminou7697
@babbalaminou7697 2 жыл бұрын
The best intro to assembly is from the book Practical Malware Analysis. Check out the Assembly crash course section
@MattGodbolt
@MattGodbolt 2 жыл бұрын
Thanks for the great shout out! This is a great introduction to Compiler Explorer in general!
@coder_rc
@coder_rc 2 жыл бұрын
The one thing to remember while learning reverse engineering is that there are a lot of things that you won't get when you try the first time and it's fine. You also have to have a lot of patience since the process of learning reverse engineering can be extremely frustrating and it can make you give up on 5 out of your 10 projects. Always remember that theory will beat practice. Have a goal in mind why you want to learn reverse engineering as that will give you a clear idea of the platform on which you will be working. For example, I want to be a Vulnerbility Researcher and find 0 days on Windows so I would learn all the basics of reverse engineering simple programs on Windows, how to debug them, the tools necessary and I would read through ctf writeups and try stuff on my own. After clearing this up, I would try to increase my level and try malware analysis as it would give me clear understanding of software protections, debugging and understanding a program when almost nothing about the program is known. Then I can proceed to learn about different kinds of vulnerabilities and how they are found and so on.
@flirtyemy042
@flirtyemy042 2 жыл бұрын
This is me right now. I’m into malware dev. and most times i need to reverse Engineer the binary I’m writing to see how it’s been executed in memory but just can’t seem to wrap my head around the assembly codes
@Jonathan-ng4vw
@Jonathan-ng4vw 2 жыл бұрын
@@flirtyemy042 How you learn malware dev. it means what is your resources to learn this.
@coder_rc
@coder_rc 2 жыл бұрын
@@flirtyemy042 the best way to learn assembly is to write own programs and see what assembly code is generated in disassemblers or you might just try making a small project in assembly. You can sort of cheat by just learning about the most commonly used assembly instructions.
@flirtyemy042
@flirtyemy042 2 жыл бұрын
@@Jonathan-ng4vw Check out Sektor7’s malware dev course for a start. It’s really good. You can then follow it up with the intermediate and then evasion courses
@flirtyemy042
@flirtyemy042 2 жыл бұрын
@@coder_rc I think I’ll check out the tools in the video. At least they’ll help highlight each instruction in assembly. Thanks
@weinihao3632
@weinihao3632 2 жыл бұрын
Maybe it's worth mentioning that the intermingled output of source code and assembly can also be achieved (and in fact this is for sure what happens in the background on that website) with objdump -S , if the binary was compiled with debugging enabled. So, even if you are somewhere without internet or don't want to share the code you are working on with whoever is running that website, you can still conveniently self-learn reverse engineering in 2022.
@thezar86
@thezar86 2 жыл бұрын
Started with your binary exploitation playlist and now working in cyber security. Thank you LiveOverflow!
@rafikkaddour8704
@rafikkaddour8704 2 жыл бұрын
Same here, so greetful for the awesome content
@zanidd
@zanidd 2 жыл бұрын
Your videos (in particular the binary exploitation playlist) have been a huge help in my cybersecurity career. Thank you very much ❤
@teddythobane2636
@teddythobane2636 2 жыл бұрын
Reversing is a way of life, and it takes time, but is very rewarding once you get the hang of it. Great video as always, sir.👌
@JoseAndCode
@JoseAndCode 2 жыл бұрын
Can you explain the rewards you have experienced
@TienNguyen-ky4dx
@TienNguyen-ky4dx 2 жыл бұрын
what do you learn this for? Bug bounty?
@teddythobane2636
@teddythobane2636 2 жыл бұрын
@@JoseAndCode being able to fully understand software at the lowest level. That enables you to come up with clever ways of using (or exploiting) the software. I'm explaining in the context of software, but, really, this applies to any system that you manage to reverse-engineer :)
@teddythobane2636
@teddythobane2636 2 жыл бұрын
@@TienNguyen-ky4dx There are a whole host of reasons why one might learn reversing. It might be for compatibility or interfacing purposes, for vulnerability research and/or exploit development, for software development (finding out how someone else implemented some or the other component or system and try to do it yourself while inferring from what they did), malware analysis, etc.
@nczioox1116
@nczioox1116 Жыл бұрын
What are some good ways for a total beginner to get started? Ive seen some beginner videos but they all seem to intermediate levels and theres only a handful of them out there it seems
@walula
@walula Ай бұрын
You always pop up in my reccomendation when i need a determination boost when studying new concepts. Thanks as always
@revebbever7723
@revebbever7723 2 жыл бұрын
Thank you so much. This simple overview was what i needed to look into reverse engineering. Assembly code doesn´t look that scary anymore!
@DRk-j7b
@DRk-j7b 2 ай бұрын
I just completed Binary Exploitation series.Thank you for your masterpiece
@eno88
@eno88 2 жыл бұрын
Weird. Just what I was looking for and you posted it 🤔
@adityagiri353
@adityagiri353 2 жыл бұрын
weird. Same case here 🤔
@-_-Girthbrooks-_-
@-_-Girthbrooks-_- 2 жыл бұрын
Every hacking inquiry I have leads to a video made by you ❤. Keep up the great work.
@astr4liteEx
@astr4liteEx 2 жыл бұрын
+rep godbolt love, didnt know asm like 2 weeks ago, watched a few vids to briefly get a hang of what it does (alot easier than what i wouldve thought actually), then used godbolt to more understand what my code does at a lower level, its really nice being able to look at asm and be able to tell what it does, especially when u can hover over parts of asm and it highlights the code responsible for it! its been a real help. documentation helps alot to for checking out odd looking functions that ive never really seen before :D 10/10
@SmokelessMeme
@SmokelessMeme 2 жыл бұрын
Much love from the H1Emu team. (Reverse engineering H1Z1)
@black_platypus
@black_platypus 2 жыл бұрын
OMG! godbolt and dogbolt are so beautiful and helpful! 🤯
@fugoogle_was_already_taken
@fugoogle_was_already_taken 2 жыл бұрын
We practiced reverse engineering by rewriting the simple basic utils like cat and tee from their asm dumps. That and also writing some assembly code is helpful
@root_etikit3658
@root_etikit3658 2 жыл бұрын
Perfect timing. I've been working my way through Practical Malware Analysis, this will be of great help! Thank you.
@logiciananimal
@logiciananimal 2 жыл бұрын
Thanks for the info about the decompiler collection. What a gift to the community!
@ZachHixsonTutorials
@ZachHixsonTutorials 2 жыл бұрын
Literally could not have come at a better time. I've been itching to dive into contributing to Metaforce (reverse engineering of Metroid Prime) and have been scratching my head not knowing how to get started
@drygordspellweaver8761
@drygordspellweaver8761 Жыл бұрын
any forums or discord groups for such projects?
@Louganda
@Louganda Жыл бұрын
@@drygordspellweaver8761 nintendo 😮
@miranda92051
@miranda92051 Жыл бұрын
This video is actually really, really good. Thank you!
@sihmy9870
@sihmy9870 2 жыл бұрын
I swear I asked myself this question today Morning & here you are with this video
@lightblue254
@lightblue254 2 жыл бұрын
I love you! Thank you so much, this helps a lot in learning how to get sharper and started! :)
@717Fang
@717Fang 4 ай бұрын
Very useful sources, thank you,man
@suryasubedi2276
@suryasubedi2276 2 жыл бұрын
To be honest i am learning reverse engineering currently (self) and worried that i cannot become one. But this single video give me a boost . Lets see what will happen in future
@nomms
@nomms 2 жыл бұрын
Learn to code in C or similar then move onto reversing. It's a process
@suryasubedi2276
@suryasubedi2276 2 жыл бұрын
@@nomms Thanks buddy And do you have any supporting materials that i am unaware off. If so plz reply me I will be waiting for it
@fareedfauzi7915
@fareedfauzi7915 2 жыл бұрын
The motivation will be on and off. Give yourself time. Fundamentals like C, asm, os architecture are important... RE skills is a self learning subject.. you need to keep on practice, research and repeat.
@suryasubedi2276
@suryasubedi2276 2 жыл бұрын
@@fareedfauzi7915 Thanks pal
@sliceoflife5812
@sliceoflife5812 2 жыл бұрын
15secs in and I'm already in agreement with your view of an abstract concept.
@rivhaaken9763
@rivhaaken9763 2 жыл бұрын
Thanks Liveoverflow!
@Chukwu_TC
@Chukwu_TC 2 жыл бұрын
I don’t even know how to get started
@albuslee4831
@albuslee4831 2 жыл бұрын
this was interesting, didn't thought I would watch the whole thing through
@daljeetbhati8353
@daljeetbhati8353 2 жыл бұрын
Loved background and editing
@yuriimynash6118
@yuriimynash6118 Жыл бұрын
Nice video I was searching for that
@yashwardhanchavan6153
@yashwardhanchavan6153 2 жыл бұрын
I am currently following along the binary exploitation series and these tools will really help me out, thanks for the video.
@blaisetelfer8499
@blaisetelfer8499 2 жыл бұрын
Good content. Reverse engineering is how I got started; after taking classes on a language or doing YT tuorials of a certain framework, I'd clone a large GitHub repo to my desktop and toy around with it. See what I could add, see what made it break, read the errors after each save. That method was just as valuable, if not more so, than the classes themselves.
@hellopleychess3190
@hellopleychess3190 2 жыл бұрын
I was confused about the "language"
@korilcrave2783
@korilcrave2783 2 жыл бұрын
IT'S REALLY USEFULL... thankyou Febian...
@kingofgods2071
@kingofgods2071 Жыл бұрын
Compiler explorer is actually a really good tool. like if you get cursor to stuff you dont know what it means it will show description of what it is like cmp, rbp and so on. thanks btw didnt knew about this tol.
@daljeetbhati8353
@daljeetbhati8353 2 жыл бұрын
Love your videos watching stream
@pandatech3245
@pandatech3245 2 жыл бұрын
Exactly the video I needed
@GucciGoblins
@GucciGoblins 2 жыл бұрын
Great video man. Love the way u pronounce array.
@knopix
@knopix 2 жыл бұрын
Thanks a lot for providing this 💖
@komismo
@komismo 2 жыл бұрын
OllyDbg and IDA is waving
@Aswin0x
@Aswin0x 2 жыл бұрын
This is what i need for past couple of weeks 😂❤️
@smart_bar
@smart_bar 2 жыл бұрын
wow, thank you, it's amazing
@101hack-g2w
@101hack-g2w 5 ай бұрын
Nice video, it helped me a lot.
@AndreasWilfer
@AndreasWilfer 2 жыл бұрын
I know this is not a very informative comment but... this video is really good and unlike my comment, very informative.
@giteshtripathi9911
@giteshtripathi9911 2 жыл бұрын
Awesome man That's what heroes do
@cinageransayeh
@cinageransayeh 2 жыл бұрын
Thanks for the video it was exciting.
@NoMore12345-z
@NoMore12345-z Жыл бұрын
Subbed, this was very useful. :)
@kebien6020
@kebien6020 2 жыл бұрын
For anyone interested, be sure to check out the talk where Mr. Godbolt talks about where Compiler Explorer comes from. It's called: CppCon 2017: Matt Godbolt “What Has My Compiler Done for Me Lately? Unbolting the Compiler's Lid”
@MattGodbolt
@MattGodbolt 2 жыл бұрын
Thanks! I have a number of talks now around where I talk about various optimizations compilers can do, as well as a (now a little out of date), "Behind the scenes of Compiler Explorer" for those interested.
@PedroLucasbp
@PedroLucasbp 2 жыл бұрын
Very nice! Thank you ❤️
@ParallaxThe
@ParallaxThe 2 жыл бұрын
Godbolt is great for just learning programing in general
@ravikiranramachandra1000
@ravikiranramachandra1000 2 жыл бұрын
Crazy channel I came across
@m.alexbenny4500
@m.alexbenny4500 2 жыл бұрын
Your videos are just amazing. It encourages me to learn more and more. And you look a little like Christian Slater from Mr. Robot 😅
@EscolaFreiMarcos2023
@EscolaFreiMarcos2023 2 жыл бұрын
Thanks, really helped
@a1esandra
@a1esandra 2 жыл бұрын
stumbled on this vid expecting wires n bits n even tho i hate assembly this is so cool
@bobbobson1555
@bobbobson1555 2 жыл бұрын
purchases I made was soft soft. I knew it was my passion but I was just stuck because of trauma I couldn't deal with. Now that I'm at a
@mgtowgaming8070
@mgtowgaming8070 2 жыл бұрын
Game hacking is a pretty good way to learn reversing skills. It has well defined goals as well, like esp, aimbot, bhop, etc, which can be used to measure success.
@i_youtube_
@i_youtube_ 2 жыл бұрын
Could you please provide a tutorial link to understand what you mean by game hacking?
@kenzakishiro5110
@kenzakishiro5110 2 жыл бұрын
@@i_youtube_ check out guided hacking’s channel, it is all about game hacking and reverse engineering a game
@skejeton
@skejeton 2 жыл бұрын
please don't do multiplayer, maybe multiplayer with you the only player, because otherwise it's not fun
@boiiboii7348
@boiiboii7348 2 жыл бұрын
@@skejeton i would agree if bypassing anticheat was easy if ur mad about cheaters no matter how good they make their client-sided anticheat it will ALWAYS be possible to bypass it and all it takes is one public cheat to let in all the skids companies need to start focusing more on server-sided anticheat so even if the hacker(reverse engineer not skid) bypasses the client its still really difficult to cheat for example u can make an anti-esp by only giving the player data of players near the enemy (like in csgo), u can use AI to combat aimbot, u can make speed/jump hacks impossible by making the players' characters serversided so that the player sends "intention" packets instead of raw position packets so the server would calculate those
@skejeton
@skejeton 2 жыл бұрын
@@boiiboii7348 I know. I don't play competitive games but I feel bad for people dealing with cheaters. learning hacking to ruin the fun is an asshole move
@0x2e2e2f
@0x2e2e2f 2 жыл бұрын
Best part of de vídeo 2:29 “see how amazing “ hahahahahha just people who watched the binary exploitation series who knows that. Liveoverflow thanks bro u are 🤩
@NaNNaN-sh4vz
@NaNNaN-sh4vz Жыл бұрын
thank you so muuch
@biehdc
@biehdc 2 жыл бұрын
Would still recommend Cheat Engine and, since it exists nowadays, Ghidra.
@ziadalaoui2461
@ziadalaoui2461 2 жыл бұрын
learning yourself is one of the best tools in the world of hacking
@PowerKuy
@PowerKuy 2 жыл бұрын
Cool
@cuty5372
@cuty5372 2 жыл бұрын
I gotta throw my University-Assighment reference Implementation in there, to compare it to my solution, to prove mine is better xD
@katkatfarkat
@katkatfarkat 2 жыл бұрын
the title so dope
@WistrelChianti
@WistrelChianti 2 жыл бұрын
Thanks!
@soaphornseuo8630
@soaphornseuo8630 2 жыл бұрын
Great resource
@Jarvx
@Jarvx 9 ай бұрын
I want to add that Chat GPT can also be an extremely useful resource for learning reverse engineering.
@kalakxfif9473
@kalakxfif9473 2 жыл бұрын
I was wondering how software cracking works. Could you do a video on the basic idea?
@Someone-ve7yn
@Someone-ve7yn 2 жыл бұрын
It's basically taking the binary itself and finding some opcode bytes to replace in order to make the software work without having a license for example. He has made a video on that topic if you want to see how it works kzbin.info/www/bejne/gqqxqplpirJsj8U
@lancemarchetti8673
@lancemarchetti8673 2 жыл бұрын
Excellent
@Backstabbio
@Backstabbio 2 жыл бұрын
Godbolt is cool unless you want to reverse Swift code into ARM64, then you're hooped. Got to do it using the Swift compiler
@Kabup2
@Kabup2 2 жыл бұрын
Ahhh memories... I used to just read the numbers, and I did know what was happening... No translation necessary.
@chriscurry2496
@chriscurry2496 2 жыл бұрын
Why not use Ghidra? It's free and it does this as well, plus it's a much more powerful tool for when you get more advanced.
@ananthuskumar1286
@ananthuskumar1286 2 жыл бұрын
Thanks mahn
@restcure
@restcure 2 жыл бұрын
Must say, the cover of your computer would make a great album cover.
@TemurSolief
@TemurSolief 2 жыл бұрын
Thanks a lot.
@Facebook-sk2iy
@Facebook-sk2iy 2 жыл бұрын
i love your videos specially the binary exploitation serie so can you do some videos about int overflow and int overlow to RCE
@LiveOverflow
@LiveOverflow 2 жыл бұрын
Checkout the PwnAdventure series. I believe it was the fire and ice challenge
@johndoe-xz2en
@johndoe-xz2en 2 жыл бұрын
Thank you for your efforts. Your channel is one of the best on KZbin.
@linuxinside6188
@linuxinside6188 2 жыл бұрын
Was
@johndoe-xz2en
@johndoe-xz2en 2 жыл бұрын
@@linuxinside6188 I am new in reverse engineering and for me, this channel gives a lot of information in a very basic way.
@LukeAvedon
@LukeAvedon 2 жыл бұрын
Wow I did not know about dogbolt
@alexobzor
@alexobzor 2 жыл бұрын
Can you please answer, how to get right tools for reversing. Because, i am newbie in this stuff. I found so many variants of gdb, i found radare2, that is a powerful framework but not without cons, i found ghidra and ida, and both of this gui tools great, and many more tools, including time travel deugging. It's blowing my mind, i can't choose between all of this, and have already spent so many time on googling all this programs. My goals is reverse engineering and binary exploitation, which stack of programs to choose ? Or how do i do it ? Help please..
@Adowrath
@Adowrath 2 жыл бұрын
Hey! I know you're generally focusing on Reverse Engineering programming code, but I was wondering if you have any experience and or helpful tools on learning how to reverse engineer a file format? I've been working on somehting in my past-time but my best approach was just trying to write parsers for the files in question in Haskell (using Megaparsec), which doesn't lead to a quick analysis cycle having to rebuild the program, running it and either handling a huge print output or navigating bit by bit into the data structures to figure out what came out.
@NikolaiSyrota
@NikolaiSyrota 2 жыл бұрын
You can reverse the format by reversing part of software that reads/writes said format
@Snowflake_tv
@Snowflake_tv 2 жыл бұрын
Thanks alot
@zedeleyici.1337
@zedeleyici.1337 2 жыл бұрын
amazing 👀
@byteflowr912
@byteflowr912 2 жыл бұрын
minor thing but there are some strikethroughs in the description
@clusterfkRust
@clusterfkRust Жыл бұрын
I’m moving to Sweden
@olegkapustkin3568
@olegkapustkin3568 8 күн бұрын
Hi, thanks for the video. I‘m getting into reverse engineering and find it really fastinating. Could you tell me are there any job oportunity in this area other then pentesting/security.
@bva1092
@bva1092 2 жыл бұрын
Useful
@markaltmann583
@markaltmann583 2 жыл бұрын
My man looking more and more like Mr. Robot
@s1mo
@s1mo 2 жыл бұрын
Reverse engineer reverse engineering
@Pixdoet
@Pixdoet 2 жыл бұрын
reverse engineering looks kinda fun :)
@hantu4321
@hantu4321 2 жыл бұрын
Better to take classes with knowledge you can reverse engineer just by looking at it. Yes you need to know assembly to reverse engineer in assembly
@hendriksahertian5525
@hendriksahertian5525 Жыл бұрын
now my mind is blow up
@its_fzx5275
@its_fzx5275 2 жыл бұрын
Amazing video liveoverflow!! But What if you are a very nooby and you don't even know anything about how computer hardware works like how cpu functions etc... I heard you mentioning some very intersting stuff like stack,heap etc... But really felt lost hearing them Can you maybe drop us a video for those how wanna get into the field but are struggling with such stuff and don't know what to learn in the beginning?
@its_fzx5275
@its_fzx5275 2 жыл бұрын
@@II_xD_II nope
@scottveron
@scottveron 2 жыл бұрын
Computer Architecture or Operating Systems courses
@malbacato91
@malbacato91 2 жыл бұрын
ironically the binary exploitation series is the best place to learn those things IMO. it's a bit old by now if you're used to new LiveOverflow production qualities, but the principles changed none at all. even if you don't care about all the exploitation stuff you can just ignore it cause honestly in the process of explaining how to break stuff LO made the best explanation of what said stuff even is, for x86 at least
@its_fzx5275
@its_fzx5275 2 жыл бұрын
Thanks to all of you guys for the awesome responses!💜
@NonsensGaming
@NonsensGaming 10 ай бұрын
the brackets actually mean its dereferencing the address
@drygordspellweaver8761
@drygordspellweaver8761 Жыл бұрын
It's the Eckhart Tolle of RE
@Me.n_n
@Me.n_n 2 жыл бұрын
Very nice 👍 thanks ^_^
@snoopiiii
@snoopiiii 2 жыл бұрын
I might be nitpicking, but at 2:04 you said a (local) variable, isn't it technically a const(ant) here? It's not a variable type where it can be changed by the program unless it's self modifying code ofcourse. Just learning the basics of C and was wondering if I got it right, so it threw me a bit off :D
@Stormrage476
@Stormrage476 2 жыл бұрын
I'm not exactly sure what you're getting at, but what makes you think this is a constant, as we don't really see the rest of the code? One way of thinking about constants in the context of C code might be a "const" variable, where the compiler /might/ optimize it so that the variable is essentially inlined (as in, for example a function call with the const value gets compiled without the variable on the stack, but rather compiled in as a constant to the function call). I'm not entierly sure how the C compiler handles it, but depending on the optimizations used non-const variables can also be optimized out (possibly not much differently than const variables). The volatile keyword in the example essentially prevents the compiler to apply such optimizations and (in this case) ensures the variable gets placed on the stack.
@StevenHay3
@StevenHay3 2 жыл бұрын
I don't see anywhere they're declared as 'const', only 'volatile' which actually tells the compiler that the value of this variable may change at any time, esp. without any action from any visible code, and as such it shouldn't attempt to apply optimizations.
@snoopiiii
@snoopiiii 2 жыл бұрын
@@StevenHay3 But the assembly doesn't show it as a variable tho 🤔
@ratchy1231
@ratchy1231 2 жыл бұрын
@@snoopiiii I think you're misinterpreting the assembly code. The line you're seeing is simply initializing the local variable with a constant value. You can also clearly see in the original C code that there isn't any constant, only variables with the "volatile" modifier applied in order to suppress compiler optimizations.
@StevenHay3
@StevenHay3 2 жыл бұрын
@@snoopiiii I'm going to be honest, I don't know nearly enough about assembly to answer :( I hope you figure it out, though!
@ma34529
@ma34529 2 жыл бұрын
There are so many RE/malware analysis content creators out there but I dont see a lot of them or even the students asking important questions like: 1) What value will this add to my career? 2) Is it a dying skillset? 3) What kind of jobs will use this skillset 4) How hard is it to get a job utilizing this skillset. I know not everyone is learning RE for job prospects but a lot are and with RE being so time consuming, I wish these questions would be addressed more.
@HA7DN
@HA7DN 2 жыл бұрын
Wait, so now we can use the HexRays decomplier without IDA pro?
I Reverse Engineered this Program Automatically.
16:53
Low Level
Рет қаралды 77 М.
Can You Find Hulk's True Love? Real vs Fake Girlfriend Challenge | Roblox 3D
00:24
Real Man relocate to Remote Controlled Car 👨🏻➡️🚙🕹️ #builderc
00:24
Patching Binaries (with vim, Binary Ninja, Ghidra and radare2)
21:00
Reverse Engineering - Computerphile
19:49
Computerphile
Рет қаралды 186 М.
Coding Was HARD Until I Learned These 5 Things...
8:34
Elsa Scola
Рет қаралды 692 М.
Comparing C to machine language
10:02
Ben Eater
Рет қаралды 5 МЛН
GHIDRA for Reverse Engineering (PicoCTF 2022 #42 'bbbloat')
17:44
John Hammond
Рет қаралды 220 М.
I made the same game in Assembly, C and C++
4:20
Nathan Baggs
Рет қаралды 801 М.
A Competition for Unreadable Code?
12:33
LaurieWired
Рет қаралды 168 М.
Hacker Tweets Explained
13:47
LiveOverflow
Рет қаралды 160 М.
How to Crack Software (Reverse Engineering)
16:16
Eric Parker
Рет қаралды 718 М.
Can You Find Hulk's True Love? Real vs Fake Girlfriend Challenge | Roblox 3D
00:24