Anti-Flag [easy]: HackTheBox Reversing Challenge (binary patching with ghidra + pwntools)

Поділитися
Вставка
  • Опубліковано 3 гру 2024

КОМЕНТАРІ • 28

  • @Tee-pn1dv
    @Tee-pn1dv 3 роки тому +5

    Very nice video. Love how smooth the video was with no transitions / cuts. You've got a new sub :)

    • @_CryptoCat
      @_CryptoCat  3 роки тому

      Thank you and welcome 🥰

  • @pliromatics2692
    @pliromatics2692 2 роки тому +2

    Solved this chall in GDB but came back here to see your patching approach. Thanks a lot once again :)

  • @ElliyahuRosha
    @ElliyahuRosha 3 роки тому +2

    Just brilliant!
    I learned so much, thx

  • @ShanaAngliang
    @ShanaAngliang 3 роки тому +2

    Amazing video, you made patching easier to do, thanks!

  • @Sam-ux5rw
    @Sam-ux5rw 3 роки тому +2

    Great stuff, love this series!

  • @gm3avxdd
    @gm3avxdd 3 роки тому +2

    This is awesome!

  • @ldohlj1
    @ldohlj1 3 роки тому +3

    Many thanks. I learned a lot ;)

    • @_CryptoCat
      @_CryptoCat  3 роки тому +1

      awesome!! thank you 🥰

  • @saketsrv9068
    @saketsrv9068 3 роки тому +2

    These videos are like gems to me found recently

    • @_CryptoCat
      @_CryptoCat  3 роки тому

      Thank you, glad you are enjoying 😊

  • @SaravanaKumar-qm7kj
    @SaravanaKumar-qm7kj 3 роки тому +6

    Could you make video about ghidra walkthrough with some basic REM analysis...

    • @_CryptoCat
      @_CryptoCat  3 роки тому +1

      hey, thanks for the suggestion! a new malware analysis series is definitely on the TODO list. however.. it's a very long list 😅

    • @SaravanaKumar-qm7kj
      @SaravanaKumar-qm7kj 3 роки тому +1

      @@_CryptoCat happy to hear that.. can't wait to see..👍

    • @seewhatseeabc
      @seewhatseeabc 3 роки тому +1

      @@_CryptoCat thqnks alot!

  • @xoreaxeax2885
    @xoreaxeax2885 3 роки тому +2

    Hey CryptoCat
    Nice way of reverse engineering 😊
    Can u pls make videos on Encryption (RC4, AES & RSA etc.) Ctf Style challenges. If already covered in this Chanel pls provide with playlist, highly appreciat it. thx u

    • @_CryptoCat
      @_CryptoCat  3 роки тому

      hey, thanks for the feedback 😊 i've done videos for most of the HackTheBox crypto challenges already (ua-cam.com/video/D0x7yjP0do4/v-deo.html ). it's not my area of speciality but your request for more crypto challenges has certainly been noted 😉

    • @xoreaxeax2885
      @xoreaxeax2885 3 роки тому +1

      @@_CryptoCat I will go through it. Thx u for considering the request..🙏

  • @heinhtetwin9057
    @heinhtetwin9057 Рік тому +1

    When calculating offset, why is it piebase 0x1525 but not 0x00101525?

    • @_CryptoCat
      @_CryptoCat  Рік тому

      good question! presumably all of the address are in the 0x0010- range, so you don't need to provide it 🤔

    • @heinhtetwin9057
      @heinhtetwin9057 Рік тому +1

      What do you mean? I tried it with the full address, it returned could not calculate VA (virtual address?).

    • @_CryptoCat
      @_CryptoCat  Рік тому

      @@heinhtetwin9057 piebase takes the RVA offset and gives you the VA - browserpwndbg.readthedocs.io/en/docs/commands/procinfo/piebase

    • @heinhtetwin9057
      @heinhtetwin9057 Рік тому +1

      Thank you. Also, I'm also a bit confused about the address. The address is relative address since we have PIE enabled, correct? The address is 1 byte (e.g., 0x00101525). Why is the address split in half, the last 4 digits used as offset is my main confusion. If the address was 0x00001525 (the first 4 zeros), I believe we could drop the zeros. In case all addresses were not in range 0x0010- how do we know how to proceed. Or does every program have the same starting addresses like this?

    • @_CryptoCat
      @_CryptoCat  Рік тому +1

      @@heinhtetwin9057 The address is relative regardless of whether PIE is enabled, e.g. the offset from the base to that instruction will always be 0x1525, but it's only important to us when PIE is enabled since we need to find the base in order to calculate the actual address. The 0x0010 will be the programs header so I guess PwnDbg detects that automatically when calculating 🙂