HackOvert
HackOvert
  • 22
  • 36 331
[002] RE Sessions - Steering the Ship
In this session we deal with time and a solution that isn't always correct. We chat about moving on from "front line reverse engineering" to steering the ship.
Thumbnail photo by: Ethan Chan on Unsplash
Outro music: Twilight Train - Dan Lebowitz
Переглядів: 161

Відео

[001] RE Sessions - Angry Robot
Переглядів 136Рік тому
In this RE Session we reverse engineer a challenge problem and take the "easy" path with Angr. Thumbnail photo by santiago costa on Unsplash.
Bug hunting using the "Portnoy Process"
Переглядів 3633 роки тому
Dan and Aaron, thanks for making your material public. It's had a profound impact on my life. Intro video clip from Reverse Engineering 101 by Dan Guido featuring Aaron Portnoy ( vimeo.com/6764570 ) Thumbnail photo by Eve Maier on Unsplash Outro music: 'Next Stop, Mars' by Streambeats
[AntiDBG] FindWindow
Переглядів 8773 роки тому
Get the code: github.com/HackOvert/AntiDBG In this video we learn about the Windows FindWindow function in order to determine if a debugger is present. Thumbnail Photo by Girl with red hat on Unsplash Outro music is Vulnerability by Streambeats / Harris Heller (SHINGU album)
Powering up your source code auditing with parsers
Переглядів 4193 роки тому
Get the code here: github.com/HackOvert/LazyBloodhound Full Disclosure link: seclists.org/fulldisclosure/2016/Feb/112 This video is a follow up to a called Source Code Auditing which looked at methods for manual source code audits to find bugs. This time we revisit source code auditing, but apply more intelligence to the problem by using a parser to power our analysis. Watch the Source Code Aud...
[AntiDBG] NtQueryInformationProcess
Переглядів 1 тис.3 роки тому
Get the code: github.com/HackOvert/AntiDBG In this video we learn about the Windows NtQueryInformationProcess function in order to determine if a debugger is present. Follow along as we observe and bypass this check for 32 and 64 bit x86. Thumbnail Photo by Lloyd Blunk on Unsplash Outro music is The Grid by Streambeats / Harris Heller (Lone Wolf album)
[AntiDBG] CheckRemoteDebuggerPresent
Переглядів 7913 роки тому
Get the code: github.com/HackOvert/AntiDBG In this video we learn about the Windows CheckRemoteDebuggerPresent function in order to determine if a debugger is present. Follow along as we observe and bypass this check for 32 and 64 bit x86. Thumbnail Photo by Andreas Dress on Unsplash Outro music is San Fransyntho by Streambeats / Harris Heller (Lone Wolf album)
[AntiDBG] NtGlobalFlag
Переглядів 7123 роки тому
Get the code: github.com/HackOvert/AntiDBG In this video we learn about the Windows NtGlobalFlag entry in the Process Environment Block (PEB) in order to determine if a debugger is present. Follow along as we observe and bypass this check for 32 and 64 bit x86. Thumbnail Photo by Nathan Dumlao on Unsplash Outro music is Cherry Vodka by Streambeats / Harris Heller (Ghost album)
Source Code Auditing
Переглядів 3,8 тис.3 роки тому
Get Drek: github.com/chrisallenlane/drek Sample Drek Signatures: github.com/chrisallenlane/drek-signatures Full Disclosure link: seclists.org/fulldisclosure/2016/Feb/112 Check out the follow up video to this titled "Powering up your source code auditing with parsers" ua-cam.com/video/ZZxQhUMtyYc/v-deo.html Thumbnail photo by Clément Hélardot on Unsplash.
A journey into anti-debugging
Переглядів 3,9 тис.3 роки тому
Grab the code here: github.com/HackOvert/AntiDBG
Hunting Format String Vulnerabilities
Переглядів 4773 роки тому
Here's the code: github.com/HackOvert/PotentiallyVulnerable/tree/main/CWE-134
The Boolean Satisfiability Problem and Satisfiability Modulo Theories (SAT / SMT)
Переглядів 12 тис.3 роки тому
Scripts referenced in this video can be found on GitHub: github.com/HackingWithCODE/LunchCTF/tree/master/SATSMT
[QuikHax:3] Creating a planar disk cookie sheet antenna for your RTL-SDR
Переглядів 4083 роки тому
Trash radio forever!
[QuikHax:2] Generating fast and accurate strings for input buffers
Переглядів 523 роки тому
Don't have time 2 spell QuikHax correctly.
[QuikHax:1] ASCII conversions using Python ord()
Переглядів 843 роки тому
Less video, more hacking!
Modeling functions with Z3
Переглядів 1,9 тис.3 роки тому
Modeling functions with Z3
File Format Reverse Engineering 3 - Templating with 010
Переглядів 1,1 тис.3 роки тому
File Format Reverse Engineering 3 - Templating with 010
File Format Reverse Engineering 4 - Digging deeper
Переглядів 5543 роки тому
File Format Reverse Engineering 4 - Digging deeper
File Format Reverse Engineering 2 - Identifying files of interest
Переглядів 1,7 тис.3 роки тому
File Format Reverse Engineering 2 - Identifying files of interest
File Format Reverse Engineering 1- Intro, target, and tools
Переглядів 2,8 тис.3 роки тому
File Format Reverse Engineering 1- Intro, target, and tools
Auditing system calls for command injection vulnerabilities using Binary Ninja's HLIL
Переглядів 1,2 тис.3 роки тому
Auditing system calls for command injection vulnerabilities using Binary Ninja's HLIL
Auditing system calls for command injection vulnerabilities using Ghidra's PCode
Переглядів 2,2 тис.3 роки тому
Auditing system calls for command injection vulnerabilities using Ghidra's PCode

КОМЕНТАРІ

  • @damiengates7581
    @damiengates7581 16 днів тому

    how did you get syntax highlighting in the template editor?

  • @damiengates7581
    @damiengates7581 17 днів тому

    based

  • @hamzazeroual2173
    @hamzazeroual2173 Місяць тому

    thanks a lots

  • @peddivarunkumar
    @peddivarunkumar Місяць тому

    Hey I need to match the solutions returned by Z3 and Excel. the equations in Excel have been modelled in Excel as multiple solutions exist they differ. I need them to match.

  • @sayub7747
    @sayub7747 Місяць тому

    what headphones do u have

  • @Trollicus
    @Trollicus Місяць тому

    Yo, I rewrote your self-debugging check in C# but I ran into a issue which you may have not, if you print anything before the check it'll print it twice because it opens 2nd process to do everything but I'm not entirely sure how to fix that so perhaps you know way lmk!

  • @vishwarajbhattrai67
    @vishwarajbhattrai67 3 місяці тому

    That's cool thanks for making the tutorial this is something I am trying to do with IDA python I am able to find vulnerable points but also wanted to find the input which will trigger that specific vulnerable code do you have any experience with symbolic execution framework like angr if yes could you please make one video on that like to find the particular input which will trigger the vulnerable code ?

  • @MrThangby
    @MrThangby 5 місяців тому

    Is the z3 ptthon api fast? I use it but it kinda slow. Wonder how to use Z3 with C or C++

  • @samsunga6927
    @samsunga6927 6 місяців тому

    Really nice vid! I am a scientist and coder w/ little experience auditing... was wondering about auditing Signal or any app for its security claims... searched how to audit code in general and saw ur vid... insightful approach. I am also reminded that what is intended (and therefore possibly claimed) in programming is not necessarily what follows, intentional or not, lol!❤

  • @Nillaes
    @Nillaes 7 місяців тому

    It's literally my first comment ever. But i have to say this channel is criminally underrated. This series is absolute gold.

  • @SchoolOverFlow
    @SchoolOverFlow 8 місяців тому

    Im good at PHP where should i start the auďiting?

  • @distortions
    @distortions 8 місяців тому

    where did you go @HackOvert

  • @inmodreal9770
    @inmodreal9770 9 місяців тому

    All I was looking for 😅😅

  • @turanbirligi6969
    @turanbirligi6969 11 місяців тому

    hello please respond is there abyy way to actually convert this game files and view them.Like i am trying to get game files but they are in specific extensions like rdf bundle extensions can i convert them into mp3 jpg or anything

  • @RobertJohnson-lb3qz
    @RobertJohnson-lb3qz Рік тому

    Looks like you have great content. Please dial up the volume some, can’t hear it...

  • @moviesynopsis001
    @moviesynopsis001 Рік тому

    Hey HackOvert, what can I do if the program I am trying to debug instantly crashes when attaching a debugger? Do i freeze the process and try and disable all of these anti debug detections then just patch the binary?

  • @AboKaff3
    @AboKaff3 Рік тому

    just dont steal @nightosphere Logo

    • @HackOvert
      @HackOvert 9 місяців тому

      Whoa weird. I had no idea who or what nightosphere is. This "logo" is just the capital "O" from a font called "Street Soul" - I just added a cross to connect the quote and make it look like an H for Hack Overt. Thanks for the heads up.

  • @Cygnus0lor
    @Cygnus0lor Рік тому

    Absolutely high-tier tutorial. You should have tons more subscribers. Thank you man! Keep it up. <3

  • @chidam333
    @chidam333 Рік тому

    interesting but can we reduce tsp or 0/1 knapsack to sat prblm ? It's so cool though

  • @dengan699
    @dengan699 Рік тому

    Your python sucks, but thanks for the intro!

    • @HackOvert
      @HackOvert Рік тому

      Well, we can’t all be masters at everything like you Denis, but thanks for the comment!

  • @galtae
    @galtae Рік тому

    good

  • @galtae
    @galtae Рік тому

    thx

  • @RealKalleAnka
    @RealKalleAnka Рік тому

    Very nice

  • @kuy.0130
    @kuy.0130 Рік тому

    videoların devamını bekliyorum TÜRKİYEDEN SELAMLAR!!!

  • @colerito
    @colerito Рік тому

    how am I the only one who has stumbled upon your vids? These are great!

  • @BipinOli90
    @BipinOli90 Рік тому

    At 12:45, why do both x and y must not be the previous value? There could be another satisfiable state with the same x but a different y, so or would make more sense. Looking at the code it does look like the or case. Maybe while saying this you made a mistake 🤔

  • @diegoporras7769
    @diegoporras7769 Рік тому

    I’m assuming that if you don’t have the source code you’d do the same but patching the binary, right?

    • @HackOvert
      @HackOvert Рік тому

      Yep, exactly! Depending on what we're doing, we may either patch the binary, or write a debugger script to automate pausing the processes, modifying memory, and continuing execution rather than patching the binary itself. It's not too common, but software can hash code segments to verify instructions haven't been patched. So in certain cases patching instructions can bite you. I would only ever be cautious of that when dealing with malware that I know employs anti-debugging or I'm working on anti-tamper or DRM targets.

  • @diegoporras7769
    @diegoporras7769 Рік тому

    How come this video doesn’t have thousands of views? This is gold man ❤ thanks

  • @mugiwara-no-luffy
    @mugiwara-no-luffy 2 роки тому

    thanks for going over this topic!

  • @timurtimak6372
    @timurtimak6372 2 роки тому

    Is it true that the hardness of the hashing algorithms: SHA-2, SHA-3 relies on the SAT problem?

    • @NXTangl
      @NXTangl Рік тому

      Kinda, basically if there exists an algorithm to efficiently invert a hash function or find collisions, the security properties are compromised. So if finding solutions to sha(x) = [known input] or sha(x) = sha(y) is something a SAT-solver can do efficiently, then sha is broken, meaning that if P=NP and we define "can do efficiently" as "can solve in polynomial time," then no hash function is safe (SAT is NP-complete).

  • @larrybird3729
    @larrybird3729 2 роки тому

    WOW!!! incredible explanation, the only reason you didn't get more views is because you didn't fill your house up with jello and scream at everyone that "you are filling your house up with jello", then change your camera angles every 2 seconds with the added random noises from manga characters.

    • @HackOvert
      @HackOvert 2 роки тому

      Thanks, I appreciate it!

  • @rahulvramesh
    @rahulvramesh 2 роки тому

    hi @hackovert, what do you think about sonarqube ? thanks for the video :)

    • @HackOvert
      @HackOvert 2 роки тому

      I don’t use it often - but have used it as a part of our CI process in the past on a development team. It was pretty great. Set up is easy, it’s fast, and it helps catch some silly issues. If you’re looking to help minimize technical debt it’s really nice.

  • @MrRaPhIpHoP1
    @MrRaPhIpHoP1 2 роки тому

    I mean what do you even recommend using it as an anti-debug? Combination of solutions? I'm trying to make an app that prevents debugging attach but from your examples everything seems too easy to bypass.

    • @HackOvert
      @HackOvert 2 роки тому

      If you’re looking to prevent reverse engineering I would suggest looking into protectors like Themida or VMProtect and utilize a virtual machine layer.

    • @MrRaPhIpHoP1
      @MrRaPhIpHoP1 2 роки тому

      @@HackOvert Yeah, more or less. I know it can't be fully protected but rather making it more difficult for fellow reverse engineers. Thanks for the hint on the VM layer, I'll do some research. Cheers.

  • @phantomBTD
    @phantomBTD 2 роки тому

    And all the useful info !

  • @phantomBTD
    @phantomBTD 2 роки тому

    Loved the video effects ! :D

  • @igobyharel8727
    @igobyharel8727 2 роки тому

    Excited to try this tool out, thank you for this video!

  • @lima4983
    @lima4983 2 роки тому

    Error MSB8066 custom build for 'AntiDBG.asm' ended with code 1 I'm trying to compile on x64

    • @HackOvert
      @HackOvert 2 роки тому

      Hey, what version of Visual Studio are you using to compile the project?

    • @lima4983
      @lima4983 2 роки тому

      @@HackOvert Visual Studio 2022, I'm downloading Visual Studio 2019 version 16.11.11

    • @HackOvert
      @HackOvert 2 роки тому

      Thanks for the info! I'm downloading 2022 now and will see if I can figure out the issue and update the repo to work with both 2019 and 2022. I just verified it builds on 2019.

    • @HackOvert
      @HackOvert 2 роки тому

      Hey, I just setup VS 2022 (Desktop C/C++ install) loaded the solution file and was able to build debug and release versions for both 32 and 64-bit builds. I'll see if I can dig into your error more and get back to you with suggestions.

  • @newzukagt3392
    @newzukagt3392 2 роки тому

    Thank you very much and this information was very good! Great video

  • @abhishekchaudhary6975
    @abhishekchaudhary6975 3 роки тому

    Thanks man !!

  • @SpooFaR
    @SpooFaR 3 роки тому

    AMAZING!!! GREAT!!!

  • @leaguejp
    @leaguejp 3 роки тому

    thank you

  • @guilhemedemassenaladario
    @guilhemedemassenaladario 3 роки тому

    That's are an amazing project that you're doing, thanks for sharing your knowledge.

  • @BookishOwlWhispers
    @BookishOwlWhispers 3 роки тому

    Did you get a chance to look into CodeQL? That should save you so much time instead of using tree-sitter. PHP is unfortunately not supported...

    • @HackOvert
      @HackOvert 3 роки тому

      CodeQL looks so cool. I'm really hoping the future will bring additional language support to the platform. I just noticed their bug bounty program which rewards CodeQL queries that models vulnerabilities in open source software (details here securitylab.github.com/bounties/). Thanks for bringing this up, I think this would be a fun project to work on.

  • @BookishOwlWhispers
    @BookishOwlWhispers 3 роки тому

    Great channel! ♡ I like the depth and the lightheartedness in your content, keep it up :D

  • @josh9761
    @josh9761 3 роки тому

    Great video keep it up!

  • @s1dev
    @s1dev 3 роки тому

    can I use this with python? will I be able to attach gauntlet.cpp to my python file and then build it? I now use pyarmor to build my .py file to exe.

    • @HackOvert
      @HackOvert 3 роки тому

      I've never used pyarmor, but I have dabbled a bit with pyinstaller. I imagine it might be possible to create some kind of Frankenstein's monster of a binary that includes these anti debugging methods. The problem is that if I wanted to reverse engineer a py-exe, I'd dump the compiled python code segment and use a Python bytecode decompiler to get the original Python - I wouldn't even mess with debugging the py-exe file as a native binary. I think that would just add too much complexity. You'll have to dig into pyarmor's API and see if there's a way to include binary files. For example, with Pyinstaller, there is the ability to load shared objects/dlls and make calls from the loaded library: pyinstaller.readthedocs.io/en/stable/spec-files.html#adding-binary-files - this might be the most direct path.

    • @s1dev
      @s1dev 3 роки тому

      Is there ways to include python in c/c# and the compile? in visual studio code.

    • @HackOvert
      @HackOvert 3 роки тому

      I don't have any experience doing that, but it looks like SWIG and Boost.Python are two options that might be viable. Check out this StackOverflow question and related answer for some leads: stackoverflow.com/questions/9117978/use-python-code-in-c-c Good luck!

    • @s1dev
      @s1dev 3 роки тому

      @@HackOvert thanks, let me check that out. :)

  • @jairai2739
    @jairai2739 3 роки тому

    Man what amazing explanation should have 1 million views, thx a lot, and go ahead with channel

  • @therokdabatherokdaba9269
    @therokdabatherokdaba9269 3 роки тому

    Great video! I love the way you explain things, keep it up!

  •  3 роки тому

    thank you so much :) this explanation really helped me to get a basic intuition for using z3. I'm working on a thesis which deals with tree-structured test data generation and my first strategy was to use smt solvers like z3 to drive the generating process, but I got a bit lost while trying to understand the smt-lib format.

  • @icryo
    @icryo 3 роки тому

    @hackovert your content is excellent, keep it up!