- 22
- 36 331
HackOvert
United States
Приєднався 8 січ 2021
Helping build current and future generations of hackers.
[002] RE Sessions - Steering the Ship
In this session we deal with time and a solution that isn't always correct. We chat about moving on from "front line reverse engineering" to steering the ship.
Thumbnail photo by: Ethan Chan on Unsplash
Outro music: Twilight Train - Dan Lebowitz
Thumbnail photo by: Ethan Chan on Unsplash
Outro music: Twilight Train - Dan Lebowitz
Переглядів: 161
Відео
[001] RE Sessions - Angry Robot
Переглядів 136Рік тому
In this RE Session we reverse engineer a challenge problem and take the "easy" path with Angr. Thumbnail photo by santiago costa on Unsplash.
Bug hunting using the "Portnoy Process"
Переглядів 3633 роки тому
Dan and Aaron, thanks for making your material public. It's had a profound impact on my life. Intro video clip from Reverse Engineering 101 by Dan Guido featuring Aaron Portnoy ( vimeo.com/6764570 ) Thumbnail photo by Eve Maier on Unsplash Outro music: 'Next Stop, Mars' by Streambeats
[AntiDBG] FindWindow
Переглядів 8773 роки тому
Get the code: github.com/HackOvert/AntiDBG In this video we learn about the Windows FindWindow function in order to determine if a debugger is present. Thumbnail Photo by Girl with red hat on Unsplash Outro music is Vulnerability by Streambeats / Harris Heller (SHINGU album)
Powering up your source code auditing with parsers
Переглядів 4193 роки тому
Get the code here: github.com/HackOvert/LazyBloodhound Full Disclosure link: seclists.org/fulldisclosure/2016/Feb/112 This video is a follow up to a called Source Code Auditing which looked at methods for manual source code audits to find bugs. This time we revisit source code auditing, but apply more intelligence to the problem by using a parser to power our analysis. Watch the Source Code Aud...
[AntiDBG] NtQueryInformationProcess
Переглядів 1 тис.3 роки тому
Get the code: github.com/HackOvert/AntiDBG In this video we learn about the Windows NtQueryInformationProcess function in order to determine if a debugger is present. Follow along as we observe and bypass this check for 32 and 64 bit x86. Thumbnail Photo by Lloyd Blunk on Unsplash Outro music is The Grid by Streambeats / Harris Heller (Lone Wolf album)
[AntiDBG] CheckRemoteDebuggerPresent
Переглядів 7913 роки тому
Get the code: github.com/HackOvert/AntiDBG In this video we learn about the Windows CheckRemoteDebuggerPresent function in order to determine if a debugger is present. Follow along as we observe and bypass this check for 32 and 64 bit x86. Thumbnail Photo by Andreas Dress on Unsplash Outro music is San Fransyntho by Streambeats / Harris Heller (Lone Wolf album)
[AntiDBG] NtGlobalFlag
Переглядів 7123 роки тому
Get the code: github.com/HackOvert/AntiDBG In this video we learn about the Windows NtGlobalFlag entry in the Process Environment Block (PEB) in order to determine if a debugger is present. Follow along as we observe and bypass this check for 32 and 64 bit x86. Thumbnail Photo by Nathan Dumlao on Unsplash Outro music is Cherry Vodka by Streambeats / Harris Heller (Ghost album)
Source Code Auditing
Переглядів 3,8 тис.3 роки тому
Get Drek: github.com/chrisallenlane/drek Sample Drek Signatures: github.com/chrisallenlane/drek-signatures Full Disclosure link: seclists.org/fulldisclosure/2016/Feb/112 Check out the follow up video to this titled "Powering up your source code auditing with parsers" ua-cam.com/video/ZZxQhUMtyYc/v-deo.html Thumbnail photo by Clément Hélardot on Unsplash.
A journey into anti-debugging
Переглядів 3,9 тис.3 роки тому
Grab the code here: github.com/HackOvert/AntiDBG
Hunting Format String Vulnerabilities
Переглядів 4773 роки тому
Here's the code: github.com/HackOvert/PotentiallyVulnerable/tree/main/CWE-134
The Boolean Satisfiability Problem and Satisfiability Modulo Theories (SAT / SMT)
Переглядів 12 тис.3 роки тому
Scripts referenced in this video can be found on GitHub: github.com/HackingWithCODE/LunchCTF/tree/master/SATSMT
[QuikHax:3] Creating a planar disk cookie sheet antenna for your RTL-SDR
Переглядів 4083 роки тому
Trash radio forever!
[QuikHax:2] Generating fast and accurate strings for input buffers
Переглядів 523 роки тому
Don't have time 2 spell QuikHax correctly.
File Format Reverse Engineering 3 - Templating with 010
Переглядів 1,1 тис.3 роки тому
File Format Reverse Engineering 3 - Templating with 010
File Format Reverse Engineering 4 - Digging deeper
Переглядів 5543 роки тому
File Format Reverse Engineering 4 - Digging deeper
File Format Reverse Engineering 2 - Identifying files of interest
Переглядів 1,7 тис.3 роки тому
File Format Reverse Engineering 2 - Identifying files of interest
File Format Reverse Engineering 1- Intro, target, and tools
Переглядів 2,8 тис.3 роки тому
File Format Reverse Engineering 1- Intro, target, and tools
Auditing system calls for command injection vulnerabilities using Binary Ninja's HLIL
Переглядів 1,2 тис.3 роки тому
Auditing system calls for command injection vulnerabilities using Binary Ninja's HLIL
Auditing system calls for command injection vulnerabilities using Ghidra's PCode
Переглядів 2,2 тис.3 роки тому
Auditing system calls for command injection vulnerabilities using Ghidra's PCode
how did you get syntax highlighting in the template editor?
based
thanks a lots
Hey I need to match the solutions returned by Z3 and Excel. the equations in Excel have been modelled in Excel as multiple solutions exist they differ. I need them to match.
what headphones do u have
Yo, I rewrote your self-debugging check in C# but I ran into a issue which you may have not, if you print anything before the check it'll print it twice because it opens 2nd process to do everything but I'm not entirely sure how to fix that so perhaps you know way lmk!
That's cool thanks for making the tutorial this is something I am trying to do with IDA python I am able to find vulnerable points but also wanted to find the input which will trigger that specific vulnerable code do you have any experience with symbolic execution framework like angr if yes could you please make one video on that like to find the particular input which will trigger the vulnerable code ?
Is the z3 ptthon api fast? I use it but it kinda slow. Wonder how to use Z3 with C or C++
Really nice vid! I am a scientist and coder w/ little experience auditing... was wondering about auditing Signal or any app for its security claims... searched how to audit code in general and saw ur vid... insightful approach. I am also reminded that what is intended (and therefore possibly claimed) in programming is not necessarily what follows, intentional or not, lol!❤
It's literally my first comment ever. But i have to say this channel is criminally underrated. This series is absolute gold.
Im good at PHP where should i start the auďiting?
where did you go @HackOvert
All I was looking for 😅😅
hello please respond is there abyy way to actually convert this game files and view them.Like i am trying to get game files but they are in specific extensions like rdf bundle extensions can i convert them into mp3 jpg or anything
Looks like you have great content. Please dial up the volume some, can’t hear it...
Hey HackOvert, what can I do if the program I am trying to debug instantly crashes when attaching a debugger? Do i freeze the process and try and disable all of these anti debug detections then just patch the binary?
just dont steal @nightosphere Logo
Whoa weird. I had no idea who or what nightosphere is. This "logo" is just the capital "O" from a font called "Street Soul" - I just added a cross to connect the quote and make it look like an H for Hack Overt. Thanks for the heads up.
Absolutely high-tier tutorial. You should have tons more subscribers. Thank you man! Keep it up. <3
interesting but can we reduce tsp or 0/1 knapsack to sat prblm ? It's so cool though
Your python sucks, but thanks for the intro!
Well, we can’t all be masters at everything like you Denis, but thanks for the comment!
good
thx
Very nice
videoların devamını bekliyorum TÜRKİYEDEN SELAMLAR!!!
how am I the only one who has stumbled upon your vids? These are great!
At 12:45, why do both x and y must not be the previous value? There could be another satisfiable state with the same x but a different y, so or would make more sense. Looking at the code it does look like the or case. Maybe while saying this you made a mistake 🤔
I’m assuming that if you don’t have the source code you’d do the same but patching the binary, right?
Yep, exactly! Depending on what we're doing, we may either patch the binary, or write a debugger script to automate pausing the processes, modifying memory, and continuing execution rather than patching the binary itself. It's not too common, but software can hash code segments to verify instructions haven't been patched. So in certain cases patching instructions can bite you. I would only ever be cautious of that when dealing with malware that I know employs anti-debugging or I'm working on anti-tamper or DRM targets.
How come this video doesn’t have thousands of views? This is gold man ❤ thanks
thanks for going over this topic!
Is it true that the hardness of the hashing algorithms: SHA-2, SHA-3 relies on the SAT problem?
Kinda, basically if there exists an algorithm to efficiently invert a hash function or find collisions, the security properties are compromised. So if finding solutions to sha(x) = [known input] or sha(x) = sha(y) is something a SAT-solver can do efficiently, then sha is broken, meaning that if P=NP and we define "can do efficiently" as "can solve in polynomial time," then no hash function is safe (SAT is NP-complete).
WOW!!! incredible explanation, the only reason you didn't get more views is because you didn't fill your house up with jello and scream at everyone that "you are filling your house up with jello", then change your camera angles every 2 seconds with the added random noises from manga characters.
Thanks, I appreciate it!
hi @hackovert, what do you think about sonarqube ? thanks for the video :)
I don’t use it often - but have used it as a part of our CI process in the past on a development team. It was pretty great. Set up is easy, it’s fast, and it helps catch some silly issues. If you’re looking to help minimize technical debt it’s really nice.
I mean what do you even recommend using it as an anti-debug? Combination of solutions? I'm trying to make an app that prevents debugging attach but from your examples everything seems too easy to bypass.
If you’re looking to prevent reverse engineering I would suggest looking into protectors like Themida or VMProtect and utilize a virtual machine layer.
@@HackOvert Yeah, more or less. I know it can't be fully protected but rather making it more difficult for fellow reverse engineers. Thanks for the hint on the VM layer, I'll do some research. Cheers.
And all the useful info !
Loved the video effects ! :D
Excited to try this tool out, thank you for this video!
Error MSB8066 custom build for 'AntiDBG.asm' ended with code 1 I'm trying to compile on x64
Hey, what version of Visual Studio are you using to compile the project?
@@HackOvert Visual Studio 2022, I'm downloading Visual Studio 2019 version 16.11.11
Thanks for the info! I'm downloading 2022 now and will see if I can figure out the issue and update the repo to work with both 2019 and 2022. I just verified it builds on 2019.
Hey, I just setup VS 2022 (Desktop C/C++ install) loaded the solution file and was able to build debug and release versions for both 32 and 64-bit builds. I'll see if I can dig into your error more and get back to you with suggestions.
Thank you very much and this information was very good! Great video
Thanks man !!
AMAZING!!! GREAT!!!
thank you
That's are an amazing project that you're doing, thanks for sharing your knowledge.
Did you get a chance to look into CodeQL? That should save you so much time instead of using tree-sitter. PHP is unfortunately not supported...
CodeQL looks so cool. I'm really hoping the future will bring additional language support to the platform. I just noticed their bug bounty program which rewards CodeQL queries that models vulnerabilities in open source software (details here securitylab.github.com/bounties/). Thanks for bringing this up, I think this would be a fun project to work on.
Great channel! ♡ I like the depth and the lightheartedness in your content, keep it up :D
Great video keep it up!
can I use this with python? will I be able to attach gauntlet.cpp to my python file and then build it? I now use pyarmor to build my .py file to exe.
I've never used pyarmor, but I have dabbled a bit with pyinstaller. I imagine it might be possible to create some kind of Frankenstein's monster of a binary that includes these anti debugging methods. The problem is that if I wanted to reverse engineer a py-exe, I'd dump the compiled python code segment and use a Python bytecode decompiler to get the original Python - I wouldn't even mess with debugging the py-exe file as a native binary. I think that would just add too much complexity. You'll have to dig into pyarmor's API and see if there's a way to include binary files. For example, with Pyinstaller, there is the ability to load shared objects/dlls and make calls from the loaded library: pyinstaller.readthedocs.io/en/stable/spec-files.html#adding-binary-files - this might be the most direct path.
Is there ways to include python in c/c# and the compile? in visual studio code.
I don't have any experience doing that, but it looks like SWIG and Boost.Python are two options that might be viable. Check out this StackOverflow question and related answer for some leads: stackoverflow.com/questions/9117978/use-python-code-in-c-c Good luck!
@@HackOvert thanks, let me check that out. :)
Man what amazing explanation should have 1 million views, thx a lot, and go ahead with channel
Great video! I love the way you explain things, keep it up!
thank you so much :) this explanation really helped me to get a basic intuition for using z3. I'm working on a thesis which deals with tree-structured test data generation and my first strategy was to use smt solvers like z3 to drive the generating process, but I got a bit lost while trying to understand the smt-lib format.
@hackovert your content is excellent, keep it up!
Hey, thanks!