Very impressed by the quality of the tutorial.Clear, concice, straight to the point how I like em'. Ghidra truly is a powerful tool but once again in the hands of a capable person it is even better. Also, that encrypted firmware had no chance at all, when the key and the booty is in the hand of the attacker it's only a matter of time! No amount of obfuscation can change that simple fact.
@@JohnAlanWoods Don't bother encrypting anything that's entirely controlled by an attacker- it's just obfuscation. You could use some sort of online method of getting the key from a central server, but even then it wouldn't be perfect.
@@JohnAlanWoods In this case the correct solution would have been to have the key inside the device in some place that does not get overwritten by a firmware upgrade. That way you don't have to ship the decryption key with new firmware. They are just idiots.
Govlarp and anon tuts are better than commercial shill tuts , For my normie web programming stuff, all we have are commercial shills and they are insufferable. Wish we had guys like this for my normie web programming tutorials. I remember the era before commercial shills, the tutorials were actually of a higher quality , like this one. Luckily commercial shills don't affect govlarp or other cool people , they only affect the normie programming world where I come from. U guys are lucky , you don't have to second guess if your tutorials are made by a grifter, The worst are those beginner JavaScript and PHP, which basically give people insecure info and get their sites hacked, I wish the normie commercial programmers would fix their tutorials when they advocate for insecure methods, Once again , u guys are lucky to have a higher caliber of material in general. In normie non govlarp programming , this would be 5 hours long and the video bar would be yellow covered with ads, and some guy advertising his shi**y udemy courses. Tl;Dr the world of normie programming has been watered down by commercial shills These tutorials are of a much higher quality than what we get Bet this guy would be great at teaching dumb people like me their normie web programming, even though it's probably way beneath their skill level. Also in the normie world, they compartmentalize stuff so nobody knows what it actually is, they just fill that space with obfuscation and buzzwords Ironic, the normie programming world is the compartmentalized one While the govlarp one(these tutorials) is clear and concise You'd think it'd be the other way around I'm too dumb to do this kind of stuff, I know IDA a bit but not much.
@@thegame4027 That too only takes one person with electronical hacking knowledge. The worst part is that once the key gets shared online, you cannot change it because it is hard coded in all devices.
Its nice to see some real hacking being done by someone that is good at it. You are also a really good teacher; clear and well paced, showing your mastery of the subject.
The AES functions in the library does not use padding. So when running openssl from command line you have to use ”-nopad” to get the last 16 bytes (and avoid the error message). Your key is also two zero bytes too short ”0000” (from the python script), but openssl will pad the key with zero bytes so it works anyway.
Very helpful video. I now see why my previous attempts understand reverse engineering were bound to fail. My way of approaching such a problem where not because I have only limit knowledge about x86 assembler - although that probably doesnt help either - it was more a misunderstanding of how to use the decompilation view. Thanks for this video, and I'm looking forward to the next videos
It was very interesting to watch the workflow and what programs were used to achieve the final goal. I'm looking to get back into reversing, but I became too rusty and there is a ton of new programs, tools and techniques that I know nothing about. I remember having fun with MSVS6, Cracker's Kit and OllyDbg on Windows XP. Those days seems so distant now..
Amazing! I'm happy to see some comprehensive coverage of Ghidra. This is packed full of useful information for Ghidra. Being familiar with reversing only gets you so far with a given program.
this is love dude... you are awesome just keep them coming Hope you explain some router firmware reversing and explaination for how these hackers are now exploiting the routers on a very large scale. Thnaks in advance :)
i watched this video after your how to use ghidra for the crack me video and i can now say i have a much greater understanding of how ghidra works. i had given up on crackme's but i can now finally attempt one with confidence. thank you so much seriously
Wow, this tutorial is of amazing quality! Since Ghidra is quite a new tool, it is quite difficult to find resources on it, so you're really doing the community an amazing service. This video made me subscribe. I'm having trouble finding a resource on how to using Ghidra for embedded firmware which isn't unix based. (No MMU, just bare metal firmware) Liveoverflow did quite an interesting series on the STM32-based legder wallet, could you please point me to a resource on analysing the same type of embedded device with Ghidra?
Amazing video. You make it easy to follow by being precise, and "answering" questions that may pop up as I watch it. Your videos are really packed with great information. I learned a lot. Thank you.
Also a short question: Your accent sounds familiar to me. Are you from germany? If i'm right: Schöne Grüße aus Bayern! Sehr gut erklärte Videos, denen auch sicher Leute folgen könnten, die bis jetzt noch kaum etwas in die Richtung gemacht haben. Hoffe da kommen noch ein paar mehr Videos! Was bringt mir all mein Wissen, wenn ich es nicht verständlich äußern kann. Wirklich gut ist man erst in einem Thema, wenn man die komplexeren Vorgänge simpel erklären kann. Und das kannst du auf jeden Fall! And maybe you could start a Discordserver for your followers. That would help to build a community:) @Ghidra Ninja
Excellent video and great channel!! Thank you for sharing your knowledge with us who are not yet experts in this matters. Golden things to learn here :)
Sir. Not very many are able to articulate a lesson in a way my brain to absorb. Especially when it comes to variables in dialect. All said it can be frustrating at times. While I am going to have to rewatch this I would personally like to thank you for your time as well as your ability to clearly lay it out... I will mos def look for more of your tutorials
Insider here: We know that the encryption is very basic and rather embarassing. We don't want to make it too easy, but we also know that even the "hardest encryption" will be cracked if enough time is invested. So this is the middle way.. Nice video, thanks for the tips!
Wonderful video. From what I see you've spent a great deal of time studying the firmware. Some basics on how you go about reverse engineering would be really helpful. Thanks.
Wow it was so great,i am really fascinated by your method, i hope that soon as you can "please" make videos about reverse engineering basics, and maybe other things also !! big thanks
thank you for your videos, its good if we can see more of your videos about CTF binary reverse. and please make your videos more easy to understand for beginners . thank you
"You should definitely make a video about reverse engineering basics"
yes
It's been awhile
Very impressed by the quality of the tutorial.Clear, concice, straight to the point how I like em'. Ghidra truly is a powerful tool but once again in the hands of a capable person it is even better. Also, that encrypted firmware had no chance at all, when the key and the booty is in the hand of the attacker it's only a matter of time! No amount of obfuscation can change that simple fact.
What is a better way to do this? Clearly not having the key inside the bin, what's better practice?
@@JohnAlanWoods Don't bother encrypting anything that's entirely controlled by an attacker- it's just obfuscation. You could use some sort of online method of getting the key from a central server, but even then it wouldn't be perfect.
@@JohnAlanWoods In this case the correct solution would have been to have the key inside the device in some place that does not get overwritten by a firmware upgrade. That way you don't have to ship the decryption key with new firmware. They are just idiots.
Govlarp and anon tuts are better than commercial shill tuts ,
For my normie web programming stuff, all we have are commercial shills and they are insufferable.
Wish we had guys like this for my normie web programming tutorials.
I remember the era before commercial shills, the tutorials were actually of a higher quality , like this one.
Luckily commercial shills don't affect govlarp or other cool people , they only affect the normie programming world where I come from.
U guys are lucky , you don't have to second guess if your tutorials are made by a grifter,
The worst are those beginner JavaScript and PHP, which basically give people insecure info and get their sites hacked,
I wish the normie commercial programmers would fix their tutorials when they advocate for insecure methods,
Once again , u guys are lucky to have a higher caliber of material in general.
In normie non govlarp programming , this would be 5 hours long and the video bar would be yellow covered with ads, and some guy advertising his shi**y udemy courses.
Tl;Dr the world of normie programming has been watered down by commercial shills
These tutorials are of a much higher quality than what we get
Bet this guy would be great at teaching dumb people like me their normie web programming, even though it's probably way beneath their skill level.
Also in the normie world, they compartmentalize stuff so nobody knows what it actually is, they just fill that space with obfuscation and buzzwords
Ironic, the normie programming world is the compartmentalized one
While the govlarp one(these tutorials) is clear and concise
You'd think it'd be the other way around
I'm too dumb to do this kind of stuff, I know IDA a bit but not much.
@@thegame4027 That too only takes one person with electronical hacking knowledge. The worst part is that once the key gets shared online, you cannot change it because it is hard coded in all devices.
Its nice to see some real hacking being done by someone that is good at it. You are also a really good teacher; clear and well paced, showing your mastery of the subject.
This video is PAAACKED with great info. Keep them coming!
The AES functions in the library does not use padding. So when running openssl from command line you have to use ”-nopad” to get the last 16 bytes (and avoid the error message).
Your key is also two zero bytes too short ”0000” (from the python script), but openssl will pad the key with zero bytes so it works anyway.
Very helpful video. I now see why my previous attempts understand reverse engineering were bound to fail. My way of approaching such a problem where not because I have only limit knowledge about x86 assembler - although that probably doesnt help either - it was more a misunderstanding of how to use the decompilation view. Thanks for this video, and I'm looking forward to the next videos
Many thanks to Ghidra Ninja and the NSA!
It was very interesting to watch the workflow and what programs were used to achieve the final goal.
I'm looking to get back into reversing, but I became too rusty and there is a ton of new programs, tools and techniques that I know nothing about.
I remember having fun with MSVS6, Cracker's Kit and OllyDbg on Windows XP. Those days seems so distant now..
I'll in love with your channel! Please create a series of Reverse Engineering Basics!
Amazing! I'm happy to see some comprehensive coverage of Ghidra. This is packed full of useful information for Ghidra. Being familiar with reversing only gets you so far with a given program.
this is love dude...
you are awesome just keep them coming
Hope you explain some router firmware reversing and explaination for how these hackers are now exploiting the routers on a very large scale.
Thnaks in advance :)
I'm a APCSA student with no experience with reverse engineering, this sounds like something very fun I can do and learn while quarantined.
Dude, please uploads more videos, you cannot imagine how we appreciate your videos. Thank you very much
i watched this video after your how to use ghidra for the crack me video and i can now say i have a much greater understanding of how ghidra works. i had given up on crackme's but i can now finally attempt one with confidence. thank you so much seriously
Unbelievable quality of the content. Massive thanks, mate!
For a moment I thought you are the presenter of SCADA: Gateway to shell from a CCC talk. Impressive work and video quality!
🤫Thank you!
This video is great. Alongside LiveOverflow one of the best RE videos on UA-cam! Keep them coming.
So glad I took the extra effort to put in security from the beginning in the firmware update system I've designed.
808 seconds of pure gold. No one sec wasted ❤
Id die to watch a reverse engineering basics tutorial. I was hooked just by watching for 2 minutes
Wow, this tutorial is of amazing quality!
Since Ghidra is quite a new tool, it is quite difficult to find resources on it, so you're really doing the community an amazing service. This video made me subscribe.
I'm having trouble finding a resource on how to using Ghidra for embedded firmware which isn't unix based. (No MMU, just bare metal firmware) Liveoverflow did quite an interesting series on the STM32-based legder wallet, could you please point me to a resource on analysing the same type of embedded device with Ghidra?
hi from liveoverflow ,which new tool do you know so far ,i need more knoledge
wow - perfect example of a very skilled knowledge/intension mix. Thx for the work and sharing.
The entropy of this video is enormous, I can see that without running binwalk -E.
You're saying it's very random? :P
Amazing video. You make it easy to follow by being precise, and "answering" questions that may pop up as I watch it. Your videos are really packed with great information. I learned a lot. Thank you.
Great Work here!
Hope there will come more in the future! Very good explained and ez to follow.
Also a short question: Your accent sounds familiar to me. Are you from germany?
If i'm right: Schöne Grüße aus Bayern! Sehr gut erklärte Videos, denen auch sicher Leute folgen könnten, die bis jetzt noch kaum etwas in die Richtung gemacht haben. Hoffe da kommen noch ein paar mehr Videos! Was bringt mir all mein Wissen, wenn ich es nicht verständlich äußern kann. Wirklich gut ist man erst in einem Thema, wenn man die komplexeren Vorgänge simpel erklären kann. Und das kannst du auf jeden Fall!
And maybe you could start a Discordserver for your followers. That would help to build a community:) @Ghidra Ninja
This guy deserves more recognition! Extremely skilled! Subbed!
Excellent video and great channel!! Thank you for sharing your knowledge with us who are not yet experts in this matters. Golden things to learn here :)
I'm here from LiveOverflow's channel and I'm loving your content. Please make more of this stuff! :D
Welcome on board 😀
That's really impressive. Thank you for walking us through.
I came to crack software, stayed for the full tutorial series. Really great stuff.
Quality of the video is excellent!
Sir. Not very many are able to articulate a lesson in a way my brain to absorb. Especially when it comes to variables in dialect. All said it can be frustrating at times. While I am going to have to rewatch this I would personally like to thank you for your time as well as your ability to clearly lay it out... I will mos def look for more of your tutorials
Insider here: We know that the encryption is very basic and rather embarassing. We don't want to make it too easy, but we also know that even the "hardest encryption" will be cracked if enough time is invested. So this is the middle way..
Nice video, thanks for the tips!
Embedded engineer here, you guys hiring?
@@kartoffelwaffel This is an anonymous account, sorry.
@@nameistunbekannt7896 As implied by your name, no worries!
This is really helpful for understanding the Ghidra workflow. Thanks!
I love your work! Nice and easy to understand. I looking forward your future videos.
Finally someone is doing it on a physical device!!!
Your seeing now is a master at work🔥🔥🔥
Wonderful video. From what I see you've spent a great deal of time studying the firmware. Some basics on how you go about reverse engineering would be really helpful. Thanks.
Your videos are really very good. Thank you for them and please continue for new ones 👍🏻
Awesome, love the information.
Your channel is great, hoping to see more of these in the future.
Wow, what an eye-opener!
Best video I’ve seen all week.
This video was so good, very well explained
Gateway to shell :D Good job Thomas, love the work you put in!!
Sorry a bit late :(
awesome video, really loved it. I'm very excited about the upcoming post on finding a vuln in the device.
damn tools are horrifyingly powerful nowadays.
I'm watching all of your videos, very good content!
This channel is going to blow up! Subscribed.
Lol now you can aes-ecb-encrypt and make a custom firmware
Wow! Thank you so much for such high quality video. Subscribed! Please keep going.
Can't wait to see more of your Ghidra videos!
Wow it was so great,i am really fascinated by your method, i hope that soon as you can "please" make videos about reverse engineering basics, and maybe other things also !! big thanks
Bro awsm video i have became a huge fan of youu you have got the skills man
So clean, so cool i love this video !
Strong content!
You should make more video man. Love your video
Next level skills right here!
As a user of Idea and doing some RE for time to time, this is very impressive !
All seems so easy but it is not.
Phenomenal vid/tutorial!!
Woah, Man, that was awesome. I cant wait to see more from You!
Great video, thank you very much!
you are amazing man, i really hope u keep going with this
DOPE AF
hey was looking for part 2 but found your 34C3 talk on SCADA system that will do i guess :), Again thank for sharing outside of con that's nice :)
awesome! cant wait for next video
this is a high level of reverse engineering !
like + subscribe
Fantastic video! I keep checking UA-cam to see if you’ve uploaded.
These are fantastic. Keep going
Really great video and good explanation. Thanks you so much for it...
Super advanced. Thanks for the video =)
Thank you for these tutorials!
Great video
Wow, great to see how this sort of stuff is done. Subscribed and look forward to checking out some of your other videos!
Very interesting, thanks for sharing!
Awesome, thank you !
This video is amazing. Subbed
woww! So much good info! Awesome!
This is so great.
Keep it up.
I subscribed and enabled the notification. Thanks for the great video.
Smashed that subscribe and notify button fast AF! Keep them coming!
Really nice video. I only hope that now you can upload more often.
Boom! Subscribe button got hit ! The bell got hit !
Danke Bruder. Hilft mir sehr
super super cooooooool ! love it !
Wow this is reeeeally cool!!
As others already have said this video is very informative and in good quality. Good job!
I guess you are German? How did you learn all of this?
Incredible tutorial!
So cool, will try something like this but for printer firmware to disable ink cartridge checks!
Superb!
Wow that was awesome 😊
thank you for your videos, its good if we can see more of your videos about CTF binary reverse. and please make your videos more easy to understand for beginners . thank you
Awesome stuff, thank you!! :)
great and amazing tutorial
I love this tool! ❤️❤️❤️
Wowwwwww Super!
Nice video bro :-)
Great vid. Thanks
yo this is insane
yeah man this is what am looking for . thx bro (y)
Genius! Got a New sub
I respect you