Using Strace to Trace Linux Syscalls

  Рет қаралды 19,496

LaurieWired

LaurieWired

Күн бұрын

Пікірлер: 48
@exalted1ne
@exalted1ne Жыл бұрын
When I was younger, I had an interest in reversing and stumbled across Lena's Reversing tutorials... I couldn't quite grasp it back then but I now have a renewed interest. The amount of effort and clarity you put in these videos is amazing. Thank you.
@liamwhalen
@liamwhalen 11 ай бұрын
I really like the presentation in these tutorials. It's like you are communicating to us from your secret bunker base--letting the people know how to use the systems that were built for them. I've used strace a bit, and your explanation will make my future use of it even better.
@NTxC
@NTxC Жыл бұрын
I'm a RE and malware analysis junkie. About 10 years ago I set up a virtual machine with Windows XP on it, downloaded dozens of gigabytes of malware, set up file + registry + network monitors and just randomly executed malware in the VM. It was a lot of fun. One of the malware samples was a keylogger which stored my keystrokes, and sent it over plain FTP to a server in Nigeria. Through Fiddler I discovered that the username and password for that FTP server was in plain text, so I tried logging in to that server and it worked. Before my eyes, on the FTP server, there were hundreds of folders, each filled with data harvested from victims of the malware. The data included also tons of banking and credit card information. I was able to discover the identity of the man running the Nigerian server and managed to find him on social media. Pretty crazy. Another malware sample I tested launched a little chat window in the middle of the screen and the chatbox literally had the title "You're Now Speaking With Mr. Hacker!"... and the person running the malware backend was typing to me, boasting about how I got haxx0red. I played along and begged him not to do any harm to my computer and he was just laughing in my face. Then I told him it's a virtual machine... and reverted to a clean snapshot. When it comes to reverse engineering, I use IDA Pro and Ghidra to discover how exactly some of my favorite older games work under the hood. Mostly Sega Genesis/Atari ST (Motorola 68000) but also x86. In one case I got in the mood to remake an 1988 game I was reversing, in C/C++, to achieve its compatibility with modern systems and fix some of the gameplay bugs. You can see some of the results of that on my channel :)
@labeqfci9556
@labeqfci9556 Жыл бұрын
The fact that you don't edit out the "errors" you make on the console while recording makes the video flows perfectly because it feels more real and like a dynamic study session instead of a pre-recorded unreal stuff. Thanks for talking about such very specific subjects.
@joojay328
@joojay328 9 ай бұрын
I LOVE this tutorial and presentation. very adhd friendly and adorable. Thank you for taking the time on this video. There are people that appreciate the work you've done. :)
@goat5480
@goat5480 Жыл бұрын
First time i see your channel, love the style and lain inspiration, you got yourself a new subscriber here 💪
@MohamedAwadin-x7i
@MohamedAwadin-x7i 6 ай бұрын
+1
@aakarshanraj1176
@aakarshanraj1176 5 ай бұрын
great video, but there are some mistakes, there is pread64 in command at 10:21 so the command didn't worked as intended.
@lis6502
@lis6502 2 ай бұрын
i don't think that this was intended but if you were able to spot it then you already know were to find correct syntax ;p
@dream0283
@dream0283 Жыл бұрын
I just started learning about it yesterday and surprisingly, you released this video today. 😂
@NTxC
@NTxC Жыл бұрын
Forgot to mention your videos are a great introduction to mobile malware analysis for someone like me, coming from workstation malware analysis, so thank you for them. That damn Fishy tune though lol, I can't get rid of it from my head
@CDizzzle4Rizzle
@CDizzzle4Rizzle Жыл бұрын
Thx for the great videos! Running strace on nmap to see how things are working under the hood. Maybe ill get to reversing some malware sometime.
@johnpapa8554
@johnpapa8554 9 ай бұрын
Beautiful and smart.. love your videos.
@Pixalynx
@Pixalynx Жыл бұрын
could you make a video on how you make your videos, I want to know how you make the overlays for copland OS etc
@gert9537
@gert9537 Жыл бұрын
Could you make a video on ltrace :)
@AliceyBob
@AliceyBob Жыл бұрын
Amazing video. Very very usefull !!!
@ankitchauhan-rv1cr
@ankitchauhan-rv1cr 3 ай бұрын
Good one Laurie.
@roccoranallo4027
@roccoranallo4027 Жыл бұрын
Great video Laurie, can you do one on GDB?
@lauriewired
@lauriewired Жыл бұрын
Great suggestion! It's on my list of one to do soon
@H0LAI
@H0LAI Жыл бұрын
I find the system call code extremely interesting from a signal path perspective. I got recommended sysinternals by GPT4 for psexec to get a peek inside the kernel. I'm curious if anything in sysinternals or syscalls can do this signal path analysis for AI behaviour, just as deep. Thanks for the video Laurie.
@OPlutarch
@OPlutarch Жыл бұрын
Love it, thank you very much! Can you make the future videos with more zoom on the terminal? Please :)
@lauriewired
@lauriewired Жыл бұрын
Sure thing, future videos are now using a larger font :)
@mateuspaimdebarros6959
@mateuspaimdebarros6959 10 ай бұрын
Você é a programadora mais linda que eu já vi
@0xReip
@0xReip 10 ай бұрын
Verdade
@AliceyBob
@AliceyBob Жыл бұрын
The desktop image with TUX. Please, share it !!
@microscorpi0n
@microscorpi0n Жыл бұрын
Why do you suppose the order of parent/child output is different after executing fork_example with the -f flag versus without? Is the timing of parent/child process execution indeterminate?
@lauriewired
@lauriewired Жыл бұрын
It's actually just happenstance what gets printed first since calling fork creates a new process that executes at the same time. You could even get these printed in a different order each time you run
@andyhusheng
@andyhusheng 5 ай бұрын
It's a nice voice. I like it😀
@PlatzHalter-j3i
@PlatzHalter-j3i 4 ай бұрын
what linux distribution you use ?
@miss_tech
@miss_tech Жыл бұрын
I love your conentent 🎉
@HassanalBolkiahSoyjak
@HassanalBolkiahSoyjak Жыл бұрын
What do you think of /g/ and Sneed?
@me_12-vw1vi
@me_12-vw1vi Жыл бұрын
my wife Laurie thinks fondly of /g/ - gentlemen and Sneed is an important historical figure
@ssuuy
@ssuuy Жыл бұрын
yeah but there is still pread64
@StupidusMaximusTheFirst
@StupidusMaximusTheFirst Жыл бұрын
I need to run an strace to detect the last time I needed to run strace. I wish you well, and I hope you never stop, but just remember that there might be a day when it's gonna be the last time you will ever run strace. You won't realize it, but you will never use strace ever again after that day. Sad...
@illegalsmirf
@illegalsmirf 10 ай бұрын
she's such adorbs 🥹
@DominikZalewski85
@DominikZalewski85 Жыл бұрын
Nicely explained and I like the style :) Sub from me
@jagagemo8141
@jagagemo8141 29 күн бұрын
Nice
@levonschaftin3676
@levonschaftin3676 Жыл бұрын
i love you
@me_12-vw1vi
@me_12-vw1vi Жыл бұрын
same ( ^ω^ )
@aisqwe6089
@aisqwe6089 Жыл бұрын
why are you geh?
@theshadypersonify
@theshadypersonify 8 ай бұрын
I clicked for the Thumbnail and I was mislead. >:(
@Omar-sr1ln
@Omar-sr1ln Жыл бұрын
wanna be tracer ? 🎵🎵
@InfernoPetrivich-mk5ft
@InfernoPetrivich-mk5ft Жыл бұрын
@LaurieWired , are u maried?) You sooo cute
@InfernoPetrivich-mk5ft
@InfernoPetrivich-mk5ft Жыл бұрын
Married*
@laurensa.1803
@laurensa.1803 Жыл бұрын
😂
Dynamically Analyzing Linux Black Basta Ransomware
24:33
LaurieWired
Рет қаралды 24 М.
Linux Backdoor Deep Dive (Part 1)
33:28
LaurieWired
Рет қаралды 11 М.
黑天使只对C罗有感觉#short #angel #clown
00:39
Super Beauty team
Рет қаралды 36 МЛН
We Attempted The Impossible 😱
00:54
Topper Guild
Рет қаралды 56 МЛН
A Competition for Unreadable Code?
12:33
LaurieWired
Рет қаралды 170 М.
Linux Immutable Malware Process Binary Attack
5:16
Sandfly Security
Рет қаралды 154
How Does Linux Boot Process Work?
4:44
ByteByteGo
Рет қаралды 748 М.
7 Outside The Box Puzzles
12:16
MindYourDecisions
Рет қаралды 145 М.
Panasonic Do-Re-Mi: an analog synth for kids with a record player built in!
12:25
Santa gave me a concurrency problem for Christmas...
12:45
LaurieWired
Рет қаралды 47 М.
Signals. I spent 2 years to understand this part.
21:24
kimylamp
Рет қаралды 261 М.
How Linux Kernel Runs Executables
16:46
Nir Lichtman
Рет қаралды 50 М.