Reverse engineering with

Поділитися
Вставка
  • Опубліковано 22 лис 2024

КОМЕНТАРІ • 186

  • @biodevm
    @biodevm 5 років тому +201

    "You should definitely make a video about reverse engineering basics"

  • @loremipsum5697
    @loremipsum5697 5 років тому +192

    Very impressed by the quality of the tutorial.Clear, concice, straight to the point how I like em'. Ghidra truly is a powerful tool but once again in the hands of a capable person it is even better. Also, that encrypted firmware had no chance at all, when the key and the booty is in the hand of the attacker it's only a matter of time! No amount of obfuscation can change that simple fact.

    • @JohnAlanWoods
      @JohnAlanWoods 5 років тому +4

      What is a better way to do this? Clearly not having the key inside the bin, what's better practice?

    • @AcheronLupus1
      @AcheronLupus1 5 років тому +8

      @@JohnAlanWoods Don't bother encrypting anything that's entirely controlled by an attacker- it's just obfuscation. You could use some sort of online method of getting the key from a central server, but even then it wouldn't be perfect.

    • @thegame4027
      @thegame4027 5 років тому +12

      @@JohnAlanWoods In this case the correct solution would have been to have the key inside the device in some place that does not get overwritten by a firmware upgrade. That way you don't have to ship the decryption key with new firmware. They are just idiots.

    • @tyrrelldavis9919
      @tyrrelldavis9919 4 роки тому

      Govlarp and anon tuts are better than commercial shill tuts ,
      For my normie web programming stuff, all we have are commercial shills and they are insufferable.
      Wish we had guys like this for my normie web programming tutorials.
      I remember the era before commercial shills, the tutorials were actually of a higher quality , like this one.
      Luckily commercial shills don't affect govlarp or other cool people , they only affect the normie programming world where I come from.
      U guys are lucky , you don't have to second guess if your tutorials are made by a grifter,
      The worst are those beginner JavaScript and PHP, which basically give people insecure info and get their sites hacked,
      I wish the normie commercial programmers would fix their tutorials when they advocate for insecure methods,
      Once again , u guys are lucky to have a higher caliber of material in general.
      In normie non govlarp programming , this would be 5 hours long and the video bar would be yellow covered with ads, and some guy advertising his shi**y udemy courses.
      Tl;Dr the world of normie programming has been watered down by commercial shills
      These tutorials are of a much higher quality than what we get
      Bet this guy would be great at teaching dumb people like me their normie web programming, even though it's probably way beneath their skill level.
      Also in the normie world, they compartmentalize stuff so nobody knows what it actually is, they just fill that space with obfuscation and buzzwords
      Ironic, the normie programming world is the compartmentalized one
      While the govlarp one(these tutorials) is clear and concise
      You'd think it'd be the other way around
      I'm too dumb to do this kind of stuff, I know IDA a bit but not much.

    • @tunahankaratay1523
      @tunahankaratay1523 3 роки тому +5

      @@thegame4027 That too only takes one person with electronical hacking knowledge. The worst part is that once the key gets shared online, you cannot change it because it is hard coded in all devices.

  • @recklessroges
    @recklessroges 5 років тому +53

    Its nice to see some real hacking being done by someone that is good at it. You are also a really good teacher; clear and well paced, showing your mastery of the subject.

  • @nxxxxzn
    @nxxxxzn 5 років тому +100

    This video is PAAACKED with great info. Keep them coming!

  • @andersp8081
    @andersp8081 5 років тому +10

    The AES functions in the library does not use padding. So when running openssl from command line you have to use ”-nopad” to get the last 16 bytes (and avoid the error message).
    Your key is also two zero bytes too short ”0000” (from the python script), but openssl will pad the key with zero bytes so it works anyway.

  • @santasl
    @santasl 5 років тому +7

    Very helpful video. I now see why my previous attempts understand reverse engineering were bound to fail. My way of approaching such a problem where not because I have only limit knowledge about x86 assembler - although that probably doesnt help either - it was more a misunderstanding of how to use the decompilation view. Thanks for this video, and I'm looking forward to the next videos

  • @usopenplayer
    @usopenplayer 5 років тому +7

    Many thanks to Ghidra Ninja and the NSA!

  • @RmFrZQ
    @RmFrZQ 5 років тому +10

    It was very interesting to watch the workflow and what programs were used to achieve the final goal.
    I'm looking to get back into reversing, but I became too rusty and there is a ton of new programs, tools and techniques that I know nothing about.
    I remember having fun with MSVS6, Cracker's Kit and OllyDbg on Windows XP. Those days seems so distant now..

  • @MrMasterRhythm
    @MrMasterRhythm 5 років тому +10

    I'll in love with your channel! Please create a series of Reverse Engineering Basics!

  • @DashieDasher
    @DashieDasher 5 років тому +5

    Amazing! I'm happy to see some comprehensive coverage of Ghidra. This is packed full of useful information for Ghidra. Being familiar with reversing only gets you so far with a given program.

  • @georgensa3942
    @georgensa3942 5 років тому +23

    this is love dude...
    you are awesome just keep them coming
    Hope you explain some router firmware reversing and explaination for how these hackers are now exploiting the routers on a very large scale.
    Thnaks in advance :)

  • @RockfordRoe
    @RockfordRoe 4 роки тому +1

    I'm a APCSA student with no experience with reverse engineering, this sounds like something very fun I can do and learn while quarantined.

  • @reallostinmyway
    @reallostinmyway 5 років тому +1

    Dude, please uploads more videos, you cannot imagine how we appreciate your videos. Thank you very much

  • @keyaedisa2
    @keyaedisa2 2 роки тому

    i watched this video after your how to use ghidra for the crack me video and i can now say i have a much greater understanding of how ghidra works. i had given up on crackme's but i can now finally attempt one with confidence. thank you so much seriously

  • @andrewshatnyy
    @andrewshatnyy 4 роки тому +3

    Unbelievable quality of the content. Massive thanks, mate!

  • @carlosdiaz4535
    @carlosdiaz4535 5 років тому +4

    For a moment I thought you are the presenter of SCADA: Gateway to shell from a CCC talk. Impressive work and video quality!

  • @jakobcranium148
    @jakobcranium148 5 років тому +3

    This video is great. Alongside LiveOverflow one of the best RE videos on UA-cam! Keep them coming.

  • @yottaforce
    @yottaforce 5 років тому

    So glad I took the extra effort to put in security from the beginning in the firmware update system I've designed.

  • @diegoporras7769
    @diegoporras7769 8 місяців тому

    808 seconds of pure gold. No one sec wasted ❤

  • @TheJuli1241
    @TheJuli1241 5 років тому +2

    Id die to watch a reverse engineering basics tutorial. I was hooked just by watching for 2 minutes

  • @goosenp
    @goosenp 5 років тому +44

    Wow, this tutorial is of amazing quality!
    Since Ghidra is quite a new tool, it is quite difficult to find resources on it, so you're really doing the community an amazing service. This video made me subscribe.
    I'm having trouble finding a resource on how to using Ghidra for embedded firmware which isn't unix based. (No MMU, just bare metal firmware) Liveoverflow did quite an interesting series on the STM32-based legder wallet, could you please point me to a resource on analysing the same type of embedded device with Ghidra?

    • @subschallenge-nh4xp
      @subschallenge-nh4xp 5 років тому

      hi from liveoverflow ,which new tool do you know so far ,i need more knoledge

  • @mitfreundlichengrussen1234
    @mitfreundlichengrussen1234 5 років тому +2

    wow - perfect example of a very skilled knowledge/intension mix. Thx for the work and sharing.

  • @DonQuichotteLiberia
    @DonQuichotteLiberia 3 роки тому

    The entropy of this video is enormous, I can see that without running binwalk -E.

    • @dumle29
      @dumle29 3 роки тому

      You're saying it's very random? :P

  • @TheSurvivor4
    @TheSurvivor4 3 роки тому

    Amazing video. You make it easy to follow by being precise, and "answering" questions that may pop up as I watch it. Your videos are really packed with great information. I learned a lot. Thank you.

  • @MrRage79
    @MrRage79 5 років тому +7

    Great Work here!
    Hope there will come more in the future! Very good explained and ez to follow.

    • @MrRage79
      @MrRage79 5 років тому +1

      Also a short question: Your accent sounds familiar to me. Are you from germany?
      If i'm right: Schöne Grüße aus Bayern! Sehr gut erklärte Videos, denen auch sicher Leute folgen könnten, die bis jetzt noch kaum etwas in die Richtung gemacht haben. Hoffe da kommen noch ein paar mehr Videos! Was bringt mir all mein Wissen, wenn ich es nicht verständlich äußern kann. Wirklich gut ist man erst in einem Thema, wenn man die komplexeren Vorgänge simpel erklären kann. Und das kannst du auf jeden Fall!
      And maybe you could start a Discordserver for your followers. That would help to build a community:) @Ghidra Ninja

  • @kosmasraptis8374
    @kosmasraptis8374 3 роки тому +1

    This guy deserves more recognition! Extremely skilled! Subbed!

  • @Mammetun
    @Mammetun 5 років тому +3

    Excellent video and great channel!! Thank you for sharing your knowledge with us who are not yet experts in this matters. Golden things to learn here :)

  • @dummybugstudios6450
    @dummybugstudios6450 3 роки тому +6

    I'm here from LiveOverflow's channel and I'm loving your content. Please make more of this stuff! :D

  • @Bits32
    @Bits32 4 роки тому +1

    That's really impressive. Thank you for walking us through.

  • @chrs-wltrs
    @chrs-wltrs 3 роки тому +1

    I came to crack software, stayed for the full tutorial series. Really great stuff.

  • @221Gregor
    @221Gregor 5 років тому +3

    Quality of the video is excellent!

  • @GUMMYBALLZ
    @GUMMYBALLZ 4 роки тому

    Sir. Not very many are able to articulate a lesson in a way my brain to absorb. Especially when it comes to variables in dialect. All said it can be frustrating at times. While I am going to have to rewatch this I would personally like to thank you for your time as well as your ability to clearly lay it out... I will mos def look for more of your tutorials

  • @nameistunbekannt7896
    @nameistunbekannt7896 5 років тому +1

    Insider here: We know that the encryption is very basic and rather embarassing. We don't want to make it too easy, but we also know that even the "hardest encryption" will be cracked if enough time is invested. So this is the middle way..
    Nice video, thanks for the tips!

    • @kartoffelwaffel
      @kartoffelwaffel 5 років тому

      Embedded engineer here, you guys hiring?

    • @nameistunbekannt7896
      @nameistunbekannt7896 5 років тому

      @@kartoffelwaffel This is an anonymous account, sorry.

    • @kartoffelwaffel
      @kartoffelwaffel 5 років тому +1

      @@nameistunbekannt7896 As implied by your name, no worries!

  • @ollopa1
    @ollopa1 5 років тому +2

    This is really helpful for understanding the Ghidra workflow. Thanks!

  • @Fictionman91
    @Fictionman91 5 років тому +3

    I love your work! Nice and easy to understand. I looking forward your future videos.

  • @timecop1983Two
    @timecop1983Two 8 місяців тому

    Finally someone is doing it on a physical device!!!

  • @hishamhaneefa7753
    @hishamhaneefa7753 2 роки тому

    Your seeing now is a master at work🔥🔥🔥

  • @evidencemonday5948
    @evidencemonday5948 4 роки тому

    Wonderful video. From what I see you've spent a great deal of time studying the firmware. Some basics on how you go about reverse engineering would be really helpful. Thanks.

  • @fatihgul77
    @fatihgul77 5 років тому +3

    Your videos are really very good. Thank you for them and please continue for new ones 👍🏻

  • @Jabdy86
    @Jabdy86 5 років тому +2

    Awesome, love the information.
    Your channel is great, hoping to see more of these in the future.

  • @iforce2d
    @iforce2d 2 роки тому

    Wow, what an eye-opener!

  • @billigerfusel
    @billigerfusel 5 років тому

    Best video I’ve seen all week.

  • @william5341
    @william5341 5 років тому +3

    This video was so good, very well explained

  • @BillEngwall
    @BillEngwall 4 роки тому +1

    Gateway to shell :D Good job Thomas, love the work you put in!!
    Sorry a bit late :(

  • @stevenaathan4894
    @stevenaathan4894 5 років тому

    awesome video, really loved it. I'm very excited about the upcoming post on finding a vuln in the device.

  • @Mr.Leeroy
    @Mr.Leeroy 5 років тому +9

    damn tools are horrifyingly powerful nowadays.

  • @heycherry100
    @heycherry100 4 роки тому

    I'm watching all of your videos, very good content!

  • @traxonja
    @traxonja 5 років тому

    This channel is going to blow up! Subscribed.

  • @LiEnby
    @LiEnby 5 років тому +32

    Lol now you can aes-ecb-encrypt and make a custom firmware

  • @ThePandaGuitar
    @ThePandaGuitar 5 років тому +1

    Wow! Thank you so much for such high quality video. Subscribed! Please keep going.

  • @S00mbre
    @S00mbre 5 років тому +1

    Can't wait to see more of your Ghidra videos!

  • @abdallahhadjallah1465
    @abdallahhadjallah1465 5 років тому

    Wow it was so great,i am really fascinated by your method, i hope that soon as you can "please" make videos about reverse engineering basics, and maybe other things also !! big thanks

  • @ashokvj8342
    @ashokvj8342 5 років тому +2

    Bro awsm video i have became a huge fan of youu you have got the skills man

  • @i_am_ur_manager7673
    @i_am_ur_manager7673 3 роки тому

    So clean, so cool i love this video !

  • @kakashisharigan336
    @kakashisharigan336 3 роки тому +1

    Strong content!

  • @rafsanuddinbegrizan8090
    @rafsanuddinbegrizan8090 5 років тому +4

    You should make more video man. Love your video

  • @jacquesquipere
    @jacquesquipere 2 роки тому

    Next level skills right here!

  • @KarLKoX
    @KarLKoX 3 роки тому +1

    As a user of Idea and doing some RE for time to time, this is very impressive !
    All seems so easy but it is not.

  • @aurinator
    @aurinator 3 роки тому +1

    Phenomenal vid/tutorial!!

  • @ctfrookie1573
    @ctfrookie1573 5 років тому

    Woah, Man, that was awesome. I cant wait to see more from You!

  • @rainerzufall1868
    @rainerzufall1868 5 років тому +3

    Great video, thank you very much!

  • @mariusk.9295
    @mariusk.9295 5 років тому +1

    you are amazing man, i really hope u keep going with this

  • @RandoYoutubeViewer
    @RandoYoutubeViewer 4 роки тому +2

    DOPE AF

    • @RandoYoutubeViewer
      @RandoYoutubeViewer 4 роки тому

      hey was looking for part 2 but found your 34C3 talk on SCADA system that will do i guess :), Again thank for sharing outside of con that's nice :)

  • @lucca1820
    @lucca1820 5 років тому +1

    awesome! cant wait for next video

  • @justforyoutube1319
    @justforyoutube1319 5 років тому +11

    this is a high level of reverse engineering !
    like + subscribe

  • @andreww3575
    @andreww3575 5 років тому +1

    Fantastic video! I keep checking UA-cam to see if you’ve uploaded.

  • @Jay22217
    @Jay22217 5 років тому

    These are fantastic. Keep going

  • @michaelcohen4503
    @michaelcohen4503 5 років тому

    Really great video and good explanation. Thanks you so much for it...

  • @OthmanAlikhan
    @OthmanAlikhan 3 роки тому

    Super advanced. Thanks for the video =)

  • @paprika5487
    @paprika5487 5 років тому +1

    Thank you for these tutorials!

  • @43ann
    @43ann 5 років тому +2

    Great video

  • @TheMadMagician87
    @TheMadMagician87 5 років тому

    Wow, great to see how this sort of stuff is done. Subscribed and look forward to checking out some of your other videos!

  • @fuanka1724
    @fuanka1724 5 років тому +1

    Very interesting, thanks for sharing!

  • @jc.baptiste
    @jc.baptiste 5 років тому +2

    Awesome, thank you !

  • @7xr1e20ln8
    @7xr1e20ln8 5 років тому +1

    This video is amazing. Subbed

  • @und3rgr0undfr34k
    @und3rgr0undfr34k 5 років тому

    woww! So much good info! Awesome!

  • @abdelazizsaad7676
    @abdelazizsaad7676 3 роки тому

    This is so great.
    Keep it up.

  • @theweirddev
    @theweirddev 5 років тому

    I subscribed and enabled the notification. Thanks for the great video.

  • @elliotmason681
    @elliotmason681 5 років тому +1

    Smashed that subscribe and notify button fast AF! Keep them coming!

  • @matteoo7212
    @matteoo7212 4 роки тому

    Really nice video. I only hope that now you can upload more often.

  • @gravypadruski462
    @gravypadruski462 5 років тому +1

    Boom! Subscribe button got hit ! The bell got hit !

  • @user-dx1gs7yz5f
    @user-dx1gs7yz5f 5 років тому

    Danke Bruder. Hilft mir sehr

  • @stormslowly
    @stormslowly 5 років тому

    super super cooooooool ! love it !

  • @jonasmayer9322
    @jonasmayer9322 4 роки тому

    Wow this is reeeeally cool!!

  • @mostdefinitelynotatroll2454
    @mostdefinitelynotatroll2454 5 років тому +5

    As others already have said this video is very informative and in good quality. Good job!
    I guess you are German? How did you learn all of this?

  • @emrealsancak1334
    @emrealsancak1334 5 років тому

    Incredible tutorial!

  • @IvanJakesevic
    @IvanJakesevic Рік тому

    So cool, will try something like this but for printer firmware to disable ink cartridge checks!

  • @xntumrfo9ivrnwf
    @xntumrfo9ivrnwf Рік тому

    Superb!

  • @sosainfotech3834
    @sosainfotech3834 5 років тому +1

    Wow that was awesome 😊

  • @WhyClarified
    @WhyClarified 5 років тому

    thank you for your videos, its good if we can see more of your videos about CTF binary reverse. and please make your videos more easy to understand for beginners . thank you

  • @foosabraun2461
    @foosabraun2461 5 років тому +1

    Awesome stuff, thank you!! :)

  • @linonava7149
    @linonava7149 4 роки тому

    great and amazing tutorial

  • @tmdh
    @tmdh 4 роки тому

    I love this tool! ❤️❤️❤️

  • @Magovit
    @Magovit 4 роки тому +1

    Wowwwwww Super!

  • @nicoladellino8124
    @nicoladellino8124 5 років тому +5

    Nice video bro :-)

  • @divadbate
    @divadbate 5 років тому +1

    Great vid. Thanks

  • @tj_1260
    @tj_1260 Рік тому

    yo this is insane

  • @lahcenedaif7953
    @lahcenedaif7953 5 років тому

    yeah man this is what am looking for . thx bro (y)

  • @zavitar9305
    @zavitar9305 5 років тому +1

    Genius! Got a New sub

  • @meideru
    @meideru 3 роки тому

    I respect you