Ghidra Static Analysis and Cracking - Keygen Creation| REVERSE ENGINEERING TUTORIAL

Поділитися
Вставка
  • Опубліковано 4 гру 2024

КОМЕНТАРІ • 25

  • @hardlyprogramming
    @hardlyprogramming Рік тому +2

    I have yet to dive too deep into Ghidra. So, these videos are much appreciated. Thanks!

    • @ch1ck3n_w1ng
      @ch1ck3n_w1ng  Рік тому

      No problem

    • @aaravinthan001
      @aaravinthan001 Місяць тому

      Bro it can use to reverse the intel hex to normal c code or Arduino code ​@@ch1ck3n_w1ng

  • @Cotten-
    @Cotten- 7 місяців тому +2

    You said that you're trying to do this youtube thing. I say just keep putting in the hard work and it will pay off.

  • @anmolbargujar
    @anmolbargujar Рік тому +3

    This vid is straight sigma 🗿

  • @patrykmezynski4400
    @patrykmezynski4400 Рік тому +2

    Best channel of this topic. Please make videos. Maybe improve your pronunciation and speaking

  • @theobgshow
    @theobgshow Місяць тому

    20 minutes of mumbling, but explains well enough

  • @yolamontalvan9502
    @yolamontalvan9502 9 місяців тому

    Mr Chickenwing, do you recommend a good channel to learn assembler? Your info are great.

  • @user-gd6gt8hi5r
    @user-gd6gt8hi5r 9 місяців тому

    9:23 why did you think it decimal?😢

  • @choksimega6764
    @choksimega6764 2 місяці тому

    Thanks for the video. Would you help me understand one exe please.. tell me how do i contact you

  • @kokrani962
    @kokrani962 10 місяців тому

    im looking into program developed on visual studio using ghidra but im not able to find the login pass related code...bcoz there is not main in functions it might be named something else can i possibly filter it out..i want to remove the login requirements to run the program..its already used for illegal purposes so please guide me a bit new to it

  • @malwareman2970
    @malwareman2970 2 місяці тому

    0:23 dejavu ,going through same shit

  • @leviwins
    @leviwins 4 місяці тому

    Little struggling agency in usa wrote that decimpiler

  • @baihu-hc3xw
    @baihu-hc3xw 11 місяців тому +1

    Can I ask you to help me reverse engineer the apk? Paid

  • @MartinSidgreaves
    @MartinSidgreaves Місяць тому

    Is there a link to that RE04.EXE crackme?

  • @baarai4883
    @baarai4883 2 місяці тому

    Hello really cool youtube chanel sadly you stop vid but hope you doing fine :) subs and liked

  • @dd-xl9nv
    @dd-xl9nv Рік тому

    i've tried to crack a program on x64dbg but it connects to a server for validations. Is it possible for you to make a video on how to crack a program that connects to a server?

    • @ch1ck3n_w1ng
      @ch1ck3n_w1ng  Рік тому

      Yesc I will look into it

    • @diamonddynamite1557
      @diamonddynamite1557 11 місяців тому

      hello, i havent really attempted reverse engineering so i could be wrong, but if it connects to the server, it will then read the response from the server, and based on that determine if you have access. you should be able to trace the disassembled code to that check and just overwrite it, making it so that you have access. now ofc there are many ways to tackle implementing a user pass system, and their implementation could be more advanced than that, but that would be where i would start

    • @teupai9575
      @teupai9575 11 місяців тому

      try to use Charles proxy, trough Charles you can intercept and edit the program's requests

  • @papus9163
    @papus9163 Рік тому +2

    I know your pain :(

  • @dydx3741
    @dydx3741 18 днів тому

    life is not that easy