thank you for all these vids, they helped me with the basics of reverse engineering. I'm currently working on reverse engineering a ps3 game and it's been incredibly fun so far
8:40 I am not a fan when people make negative comments about someone's use of a tool to complete a task. Programming doesn't need more elitism or stupid battles.
I read your comment before watching that part and I totally got the wrong idea lol Thought you meant that no-code "hackers" should not be looked down upon. To which I disagree. But by "tool" you were referring to the choice of language, to which I agree, hacking is a mess either way, the choice of language should not matter as long as it does the job.
Thats how you know he is a _real manly_ C/C++ programmer, he apologies for using Python, and as a fellow C/C++ programmer I forgive you. Jokes aside, good video!!!
For anyone here new to Python, if __ name __ == "__main__": main() prevents the main function from running when you import the file/script somewhere else. If you call a function after defining it without this check, it will run even if the file is imported, which you usually don't want Edit: had to insert spaces between the underscores and name because YT thought I wanted it italic. In actual code, it would be 2 underscores, name, 2 underscores (no spaces between); sometimes read as "dunder name" (concatenating/abbreviating "double underscore" to "dunder")
14:37 - Hold up. Where did these magic hex numbers come from? Why those offsets? Can they be determined in a cleaner way, rather than hard coded like that?
Why - just speculating here, because cpp streams are weird. How - he has emulated the result of the text input himself, he put the string pointer on the stack (this is exactly what that cpp function does after fetching the text), and he has skipped the stdin function.
The decompilation target language doesn't matter. If you can compile source code to *native* bytecode, you can reverse it if you know the bytecode's target ISA (e.g. x86, x86_64, AMD64, various versions of ARM, et cetera). Some bytecode is *not* natively compiled such as WASM, CIL, and Java bytecode. C is preferable for decompilation because it normally has very little abstraction and is *almost* 1:1 with assembly language. C runtimes or compilers usually inject boilerplate for setup of heap memory management.
What keyboard are you using? I like that it's not a crappy loud mechanical keyboard, that even your neighbours could hear through three walls. Is it the same in your current videos?
I love your merch, I have the mousepad and the t-shirt, do you have any other plans for more reverse engineering or low level related merch? I would totally buy more
When running with correct permissions you can choose to disable ASLR for a spawned process which is likely what angr does. GDB uses the "personality" syscall to do this with the flag ADDR_NO_RANDOMIZE.
Great video, I'm new to this stuff. couple of doubts, when giving the address of the good and avoid case, why is only 4byte address is provided instead of entire address from memory map? secondly, how the hell do you learn all there stuff? since there are multiple libraries/tools.concepts used just for one problem. Impressive btw!
Hey , very nice intro to angr, i have a bit that i didn’t get is why the first try with the 32.8 bit key space reached in the simulator the last address ? That for me doesn’t yet click
Can you make a video on how this would work when an application also has a DLL etc? ive tried this once on an application with a DLL and it got very confusing, really couldnt figure any of it out.
Now crackmes are cool but whos gonna actually have good info on compiling osx/xnu kernel, modifying kernel/writing a kernel driver to disable debugging detection, bypass address randomization. What for? Oh yeah, just to bypass debug detection and also have a way to dump consistent traces. And just to begin on actually getting progress with 20mb+ binaries
@@atijohn8135 The thing is, binary instructions follow the intel syntax. So, especially for those who create compilers, the AT&T syntax is confusing, even tho it makes more sense...
When machines take over us, I hope you speak for us all as you know their native language. Interesting to watch, don't hava a clue about how anyone can learn those skills... :D
There's a piece of abandoned niche commercial software which I'd love to crack for archival purposes. Will this work on it? It's written in Delphi and it can be activated offline even though there was an internet activation option (which obviously doesn't work anymore). There is version 3.x which is still being sold even though there were no updates for 8 years or any activity from the dev whatsoever. Thing is, version 3.x is a joke. Well, 2.x was an actual joke, not worth a penny, and 1.x is the legendary version which I'd like to crack. I believe it would still be used today if the dev released a 64bit version like he promised :( The released version crashes way too often because of the ram limitation.
Meh, automating the reverse engineering takes the fun out of the problem :p if each of those functions was only checking one of the bytes, you could solve each fairly simply, I'd imagine.
nice
nice
nice
nice
nice
nice
even if i didn't understand anything, all i could to say is that the humanity is still good that person like you still exist, thanks a lot
idk man, he's writing P*thon
@@rawallon lol python is good for such this work tho
2:55 in and already 100% worth watching. Knowing I can use Ghidra without migraines is such a performance booster.
This ain't low level chanel this is high level chanel I learn a lot
Also thx LLL
chanal
@@basedfacistman you see...
FAST LOOK AN ALIEN
Nah just a bird, oh look chanel. I wonder what happened
*channel
@@vnc.t the n went on vacation
LLL feels more Supreme than Chanel
Whole thing went above my head but I still watched... Soon it will go in my head... IDK when
Totally. So often for me, understanding comes through the side door unannounced.
@@iwakeupsad haha.. yeah.. unexpectedly..
thank you for all these vids, they helped me with the basics of reverse engineering. I'm currently working on reverse engineering a ps3 game and it's been incredibly fun so far
MGS4?
@@Pr0xima_audio NieR : Gestalt
Thanks for increasing the font size LLL 📱
Honestly this is pretty interesting, I NEED MORE OF such content PLEASE.
8:40 I am not a fan when people make negative comments about someone's use of a tool to complete a task. Programming doesn't need more elitism or stupid battles.
I read your comment before watching that part and I totally got the wrong idea lol
Thought you meant that no-code "hackers" should not be looked down upon.
To which I disagree.
But by "tool" you were referring to the choice of language, to which I agree, hacking is a mess either way, the choice of language should not matter as long as it does the job.
How is it only now I find this gem of a channel? Dang youtube
Looks like a lot of fun once you understand what's going on and know ways you could tackle the proble
I've never commented on a video before, but I had to for this one. It's that good!
Thats how you know he is a _real manly_ C/C++ programmer, he apologies for using Python, and as a fellow C/C++ programmer I forgive you.
Jokes aside, good video!!!
For anyone here new to Python,
if __ name __ == "__main__":
main()
prevents the main function from running when you import the file/script somewhere else. If you call a function after defining it without this check, it will run even if the file is imported, which you usually don't want
Edit: had to insert spaces between the underscores and name because YT thought I wanted it italic. In actual code, it would be 2 underscores, name, 2 underscores (no spaces between); sometimes read as "dunder name" (concatenating/abbreviating "double underscore" to "dunder")
bro I could watch this every day that was awesome
Thank you, LLL, the font size saved me :)
14:37 - Hold up. Where did these magic hex numbers come from? Why those offsets? Can they be determined in a cleaner way, rather than hard coded like that?
Did you find out this part? also need help here!
excellent content!! enjoy your thorough analysis.
I love this channel.
Nicely done, Mr LLL.
Thanks for zooming in!
So *why* does angr have issues with stdin and how were you able to work out the fix?
Why - just speculating here, because cpp streams are weird.
How - he has emulated the result of the text input himself, he put the string pointer on the stack (this is exactly what that cpp function does after fetching the text), and he has skipped the stdin function.
The man, The myth, The legend. Found you again
what if the binary was built in something else like Rust for example? whould then Ghidra reverse engineer it to C or to Rust?
The decompilation target language doesn't matter.
If you can compile source code to *native* bytecode, you can reverse it if you know the bytecode's target ISA (e.g. x86, x86_64, AMD64, various versions of ARM, et cetera). Some bytecode is *not* natively compiled such as WASM, CIL, and Java bytecode.
C is preferable for decompilation because it normally has very little abstraction and is *almost* 1:1 with assembly language. C runtimes or compilers usually inject boilerplate for setup of heap memory management.
What keyboard are you using? I like that it's not a crappy loud mechanical keyboard, that even your neighbours could hear through three walls. Is it the same in your current videos?
Great video! Very informative and well explained.
I love your merch, I have the mousepad and the t-shirt, do you have any other plans for more reverse engineering or low level related merch? I would totally buy more
1:46 How do you know that it's little-endian? Doesn't ARM support both?
Angr looks really neat. I suppose in some cases one runs into formal undecidability. How does it "cheat'"?
I'm curious how angr works with ASLR enabled.
When running with correct permissions you can choose to disable ASLR for a spawned process which is likely what angr does. GDB uses the "personality" syscall to do this with the flag ADDR_NO_RANDOMIZE.
@@nomio_o ah, good to know.
Ngl I am pretty new to low level stuff but I recommend running it a bit first before even running strings
would be great to see more complicated examples of using angr
3:50 thanks LLL!
Great video, I'm new to this stuff. couple of doubts, when giving the address of the good and avoid case, why is only 4byte address is provided instead of entire address from memory map? secondly, how the hell do you learn all there stuff? since there are multiple libraries/tools.concepts used just for one problem. Impressive btw!
Goodluck...sir... perfect
why on earth do you not have the link to the cracksme in the description man
Hey , very nice intro to angr, i have a bit that i didn’t get is why the first try with the 32.8 bit key space reached in the simulator the last address ? That for me doesn’t yet click
Can you make a video on how this would work when an application also has a DLL etc? ive tried this once on an application with a DLL and it got very confusing, really couldnt figure any of it out.
Awesome work !
I wasn't worried about the empty boxes, until you said something LOL.
Ik that’s it’s been a while, but thx LLL!
How do i find the CTF program, can you link it to me so I can do all the steps myself?
why the -0x58? where does it come from?
I loved the video; I didn't understand anything, but it was an excellent video.
Now crackmes are cool but whos gonna actually have good info on compiling osx/xnu kernel, modifying kernel/writing a kernel driver to disable debugging detection, bypass address randomization. What for? Oh yeah, just to bypass debug detection and also have a way to dump consistent traces. And just to begin on actually getting progress with 20mb+ binaries
thanks for increasing the size mr lll :)
Do you have any recommendations on books that are useful desk references for this stuff?
I am looking forward, when we can take a binary and automatically turn it with AI in beautiful source code with comments etc.
we finally got ghidra in dark mode
do you prefer intel or at&t syntax?
intel of course
@@grandmakisses9973 Based opinion
intel addressing syntax and at&t argument order ("mov rax (to) rcx" makes more sense than "mov (to) rcx: rax")
@@atijohn8135 The thing is, binary instructions follow the intel syntax. So, especially for those who create compilers, the AT&T syntax is confusing, even tho it makes more sense...
AArch64
Thanks LLL
Is scanf still using self modifying code or something ?
this is some dark art shit- only able to follow a little of it, but interesting
I needed the font size increase and I'm on desktop lol. Thanks LLL
how can I change ghidra to dark mode?
Can you do a Ghidra tutorial pls?
...I need practise "hello world!" again, 60th time
Thanks for the Font LLL!!!!
do you use computer with arm cpu?
Cool, next do Denuvo. Let's see how good you are!
Low level programming is the hardest my bro
ReSearch about it.
cool. now how do i guess what a weird 8 byte value does?
yes, yes.. of course i understand all this
Can you crack how to exit vim?
Wait, how are you running arm code on your machine?
perhaps a VM
@@tronosgamingwizard does ghidra run on ARM? I guess with the magic of editing (or ssh) he could be on different machines
@@ffeliziani I'm unable to answer this one, mate.
Sorry yeah the Q should have been for @lowlevellearning
@@ffeliziani It's Java. So if the JVM runs on ARM then it will (more/less) run.
The magic starts at 15:44 😃
Dark mode, let's go!
you are the best
When machines take over us, I hope you speak for us all as you know their native language. Interesting to watch, don't hava a clue about how anyone can learn those skills... :D
May be a dumb question, but why not brute force it instead?
If you can do this technique then it's far superior to brute forcing. Brute force would take far longer.
Thanks for your channel. I would love it even more without the background music.
Thx lll for zooming in
Thanks LLL.
THANKS LLL
Thanks triple o
what does SAT mean?
satisfiability solver
Great!
Waiting for LLL x LaurieWired video :)
Wait are you a cuber as well?
Thanks LLL
Hi please make more
Thanks tripple el
There's a piece of abandoned niche commercial software which I'd love to crack for archival purposes. Will this work on it? It's written in Delphi and it can be activated offline even though there was an internet activation option (which obviously doesn't work anymore).
There is version 3.x which is still being sold even though there were no updates for 8 years or any activity from the dev whatsoever. Thing is, version 3.x is a joke. Well, 2.x was an actual joke, not worth a penny, and 1.x is the legendary version which I'd like to crack. I believe it would still be used today if the dev released a 64bit version like he promised :( The released version crashes way too often because of the ram limitation.
It’s so weird knowing that the NSA has a program named after the Godzilla monster
Remember that it's still nerds inside NSA that are responsible for creating and maintaining this. If they can get away with it, they will.
@@VivekYadav-ds8oz Ofc, every major tech system has been built up and maintained by nerds. It’s still pretty wild regardless
You unbaked the bread!
Man you don't have to apologize for python. You don't have to apologize for anything!^_^
Thx 3xL
Symbolic Execution 🔥🔥
Thanks LLL
I need to learn how to do this proficiently so I can hack car ECUs for tuning. They made it so hard to tune cars these days...
the a/v desync lmao
nothing is clear, but very interesting 🤠
Thanks triple L - in the chat!
Meh, automating the reverse engineering takes the fun out of the problem :p if each of those functions was only checking one of the bytes, you could solve each fairly simply, I'd imagine.
Someone should write an ANGR-y UI for gui people
I have some experience with coding. The further this went on my head started spinning though. This is on another level, quite interesting ^^
I didn’t like that was necessary to use angr to solve the challenge
LFG!!!! LLG GANG GANG!
That angr math solver didn't make any sense lol
Thanks LLL. Still needs to be bigger for my blind ass 😂