Reverse Engineering/Game Patching Tutorial: Full Res RollerCoaster Tycoon with Ghidra+x64dbg+Python

Поділитися
Вставка
  • Опубліковано 21 лис 2024

КОМЕНТАРІ • 552

  • @das_evoli
    @das_evoli 2 роки тому +201

    I have no idea why this looks so fun to do. You feel like a damn detective

    • @jeFF0Falltrades
      @jeFF0Falltrades  2 роки тому +36

      Same thrill of solving a puzzle (and/or crime - especially reversing malware 😁). Thanks for watching and glad you enjoyed!

    • @MatVeiQaaa
      @MatVeiQaaa 2 роки тому +10

      I am doing a bit of that stuff and it actually feels like treasure hunt, like you are in some fucking mysterious ancient catacomb solving its mysteries lmao. Very fascinating.

    • @MatVeiQaaa
      @MatVeiQaaa Рік тому

      @Abraham Johnathan I had this idea for a while, but the issue I have with that is that it’s just a game. Usually I solve some actual problem which people need to be solved with what I’m doing.

    • @MatVeiQaaa
      @MatVeiQaaa Рік тому

      @Abraham Johnathan Easy to get in to, ridiculously difficult to master :) It's a great thing to do, good luck and have fun!

    • @KaizenWebDev
      @KaizenWebDev 11 місяців тому +3

      Enjoy the "fun" while you can

  • @siljamickeify
    @siljamickeify Рік тому +188

    I LOVE that you keep your mistakes in the tutorial!! It is soo valuable for a learner to see what is difficult even for the teacher!
    Wonderful tutorial, both in content and style.

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +30

      I do believe in keeping in the mistakes and identifying them because it helps me learn too! And it’s true, there’s always so much to know and learn that there are bound to be mistakes, and that’s okay - I really appreciate when someone corrects me and helps educate me.
      Now that said, I would be lying if I didn’t say I also edit out a couple of hours of mistakes like my voice cracking, me cursing because I forgot something or misspoke, me forgetting to turn my phone off, me blanking on a keyboard shortcut, etc. - Y’all don’t need to know how much of a mess I am personally 😂

    • @siljamickeify
      @siljamickeify Рік тому +2

      @jeFF0Falltrades if you edit out a lot, then it is even more impressive! The bits you left in are not only important to give a general sense of something being hard. You actually show the process of gaining information. Otherwise it is easy for a beginner to dismiss the teachers process as just being magic, I.e. there is no process, you either get it or don't get it. That can be so demotivating! But you show the process, which is truly motivating. "I can also do that! Maybe even a little bit faster than the teacher!"

    • @RandomUser2401
      @RandomUser2401 Рік тому +1

      @@jeFF0Falltradesso the issue where the game was only painted/rendered in tiles resolved it self automagically with the patch?

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +2

      @@RandomUser2401 So some spoilers, but I’ll actually be talking more in depth about this in my upcoming vid - I realized we didn’t really dive into the “why” behind the blackness shown in the intro in this vid, but in short - yes, the patch fixes the error, and the reason we see that blackness is due to the screen not being refilled with colors properly after the window is destroyed if the max resolution of the machine is bigger than the max threshold expected. More details to come 😉

    • @RandomUser2401
      @RandomUser2401 Рік тому +1

      @@jeFF0Falltrades wow, so nice! That‘s so much more than the best answer I could‘ve imagine. Awesome, looking very forward to this video! Keep up the great reveng videos👌🏻

  • @tov7913
    @tov7913 2 роки тому +58

    1 and a half year later and it is still a great video! I always wondered how patches for older games were made and this video literally answers this question on point!

    • @jeFF0Falltrades
      @jeFF0Falltrades  2 роки тому +9

      Thanks for watching!

    • @jatodd3746
      @jatodd3746 9 місяців тому +2

      Now 3 years since video release, and still great.

  • @StefanNoack
    @StefanNoack Рік тому +109

    34:27 you forgot to convert to decimal. 0x20 corresponds to the border size (entry 32) not the scrollbars. Which also explains why the value is doubled, since borders are on both sides. It doesn't matter, though :)

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +26

      Thank you! Someone else pointed this out and I totally did - I even said at the start of that segment “These are the values in decimal on this page” or something 🤦‍♂️
      I edited the description a while back to include this correction.
      Thanks for watching!

  • @dracenmarx
    @dracenmarx Рік тому +73

    It was very entertaining to watch! Just one improvement suggestion: It would be good to name variables, functions and memory addresses in the moment you identify them. Then the code browsing in Ghidra is much easier.

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +20

      Thank you for the candid feedback! Others have remarked this on this particular video and it made me realize in retrospect that I missed the opportunity to do so in this one (I was so excited to publish this as my first vid that I think my mind was all over the place).
      That said, I’ve tried to improve that in my other videos so I hope you’ll find the feedback well received! Thanks so much for watching!

  • @steventwigg2369
    @steventwigg2369 3 роки тому +3

    The intro montage of Roller Coaster Tycoon deserves an award.

  • @NavnikBHSilver
    @NavnikBHSilver Рік тому +71

    I have very little experience with assembler code of any kind, yet as a dev, and with the way you explained it, it was actually fairly comprehensive and mirrors a lot of typical high-level debugging, except you're dealing with unknown source code. I am likely not going to use what you demonstrated here any time soon, but knowing it is an option, and a path I could take if I feel dedicated to a goal, is very cool and exciting.

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +7

      That is awesome feedback, Navnik - As long as you had fun and came out of this having more knowledge than you started with, I am more than happy. If it comes in handy for you some day - even better! Thanks for watching!

    • @tahargermanni6205
      @tahargermanni6205 Рік тому

      @@jeFF0Falltrades Hi Jeff, could you please help me to bypass the registry in app that the manufacturer is not existing anymore.

  • @toweri_li
    @toweri_li Рік тому +13

    The first time I am watching how an executable is debugged / patched on Windows - as opposed to Commodore 64 ROM in late 80's - and I actually understood this!
    This speaks volumes on your capability to explain a fairly complex process to a 100% genuine noob in undestandable way!
    Go ahead, pat yourself on the back. You truly deserve it! :)

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +2

      Ah man, thank you so much for the kinds words! So glad you were able to get something out of it; Thanks so much for watching!

  • @Eirenband
    @Eirenband 2 роки тому +34

    What a great video. So far this is the only RE video I've come across that showed a full and concise analysis with a working patch at the end.

    • @jeFF0Falltrades
      @jeFF0Falltrades  2 роки тому +2

      So happy you enjoyed it!
      I have a new vid cooking now; Hoping to upload by end of Jan :-). Thanks so much for the kind words.

  • @naveenjkondeti4214
    @naveenjkondeti4214 3 роки тому +44

    Nice, Always wanted to get into reverse engineering. Seems like starting with videogames could be fun way to start..

    • @jeFF0Falltrades
      @jeFF0Falltrades  3 роки тому +12

      Thanks for watching!
      Yeah, that’s partly why I wanted to start with this problem - it’s a bit easier to wrap your head around than starting with something like malware analysis. I hope this is helpful to you!

    • @ricardonacif5426
      @ricardonacif5426 3 роки тому +2

      Guidedhacking.com is a great start for that.

  • @RandyFortier
    @RandyFortier 7 місяців тому +4

    Great video, and very interesting to see the process.
    One recommendation would be to change the names of the variables and functions in Ghidra as you go. It will make the program become more readable over time, as you discover what everything does.

    • @jeFF0Falltrades
      @jeFF0Falltrades  7 місяців тому

      Thank you Randy!
      Yeah, this being my first one of these videos, I failed there, likely due to overexcitement 😁 - this was one of the primary pieces of feedback I got for this one, and I took it to heart. Happy to say I’ve gotten better with subsequent videos.
      Thanks so much for watching and for the kind words!

    • @RandyFortier
      @RandyFortier 7 місяців тому +2

      @@jeFF0Falltrades It is pretty rare to find this content, so I was glad to find it. The quality is very good!
      I look forward to watching some of the other videos!

    • @jeFF0Falltrades
      @jeFF0Falltrades  7 місяців тому

      @@RandyFortier Thank you so much! And agreed; that’s really why I’ve kept with it.
      That and the incredible community that’s been built up around it :-)

  • @pedrogabrielnogueira1068
    @pedrogabrielnogueira1068 10 місяців тому +2

    I'm just saying what i think of the beginning of the video: This looks amazing. You are going to solve a real problem for a game with patching. Awesome. Valuable content.

    • @jeFF0Falltrades
      @jeFF0Falltrades  10 місяців тому +1

      Thank you so much! I hope you enjoy this, and if you do, I hope you enjoy my other vids - which arguably have only gotten better in quality with time (not by much but I’d like to think a little 😂)
      Thanks so much for watching and for your kind words!

  • @AlphaYellow
    @AlphaYellow 11 місяців тому +4

    I have a really longtime goal of patching most of the mid to late 90s and early 2000s 3D games that never got any kind of unofficial patches (both known and unknown ones, seems like there's a popularity and nostalgia bias in relation to the modding community for old games), but that's proving to be way more difficult than I thought, your tutorials are helping me quite a bit though, thanks

    • @jeFF0Falltrades
      @jeFF0Falltrades  11 місяців тому

      So glad to hear it! So many good games in the graveyard that could potentially be resurrected!
      Hope you enjoy this and my other tutorials

  • @jmikhailov
    @jmikhailov 2 роки тому +6

    Thank you for keeping the threshold of content's quality so high

    • @jeFF0Falltrades
      @jeFF0Falltrades  2 роки тому +1

      Thank you for watching and so happy you enjoy!

  • @govnaizmesare
    @govnaizmesare 3 роки тому +91

    Great video! Would like to see more content like this. There's one small mistake however, the GetSystemMetrics is passed a hex value in the Ghidra overview, so instead of 20 and 21 it should be 32 and 33, which relates to the thickness of the window border and not the arrows.

    • @jeFF0Falltrades
      @jeFF0Falltrades  3 роки тому +39

      Oh wow you are absolutely correct - I even say “They’re in decimal on this page” out loud and I still mucked that up!
      Thank you for pointing this out! I have added a correction in the description of the video. I really appreciate you catching this and watching!

  • @greatnotch360
    @greatnotch360 2 місяці тому +1

    I'm just starting to learn how to do reverse engineering, and you gave me a lot of tips where shall I find certain bits of information. Thank you!

    • @jeFF0Falltrades
      @jeFF0Falltrades  2 місяці тому +1

      So glad to hear that - thanks so much for watching and glad you enjoyed! Good luck in your learning journey.

  • @sigxfs
    @sigxfs Рік тому +6

    Awesome tutorial. I have experience reverse engineering and tweaking games with Cheat Engine but I've never taken the plunge into Ghidra as it always seemed intimidating, this video was a great introduction to it. I really appreciate you showing the x64dbg breakdown aswell, super useful.

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +2

      So glad you enjoyed and thanks for the kind words! If you ever want to dive in deeper, feel free to check out the x86 reversing series I posted here last month.

  • @nemtudom5074
    @nemtudom5074 Рік тому +1

    I just yesterday figured out basic hex editing to reverse engineer how Heroes of might and magic 3's scoreboard works, so this video came at just the right time to fuel my newfound interest
    Thanks

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому

      Great to hear! I’m finishing up another game modding tutorial as we speak, so stayed tuned! Thanks for watching

  • @djglitch2.031
    @djglitch2.031 Рік тому +2

    I was looking for a way to reverse engineer programs to understand how some functions work when building other things. I didn't know that exe decompilers already existed. Saves me a bunch of time.

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому

      They do and they are (or can be) wonderful. Thanks for watching!

    • @djglitch2.031
      @djglitch2.031 Рік тому +1

      @@jeFF0Falltrades Can you make a tutorial on how to install one though? Cause it downloads a zip and I tried looking for some to no avail, unless you can add a tutorial video to the desc. that's already made. It's also very confusing on how to install programs that are in zip files in general.

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +1

      @@djglitch2.031 You know that’s not a bad idea - I’m realizing I have it preinstalled in all my vids - Next time I make a vid with Ghidra I can do a full install of it.
      It’s not difficult to understand once you know how Ghidra works via Java, but yeah - I do remember I had to take a few extra steps to make a shortcut to it and such and make it “act like a normal program”.
      Thanks for the feedback!

    • @djglitch2.031
      @djglitch2.031 Рік тому +1

      @@jeFF0Falltrades Np, I like the helpful programs that always seems to be in zip formats which get really annoying to work out for newbies like me.

  • @lennard21M
    @lennard21M Рік тому +3

    I rarely watch such long videos but I enjoyed this one until the last minute. Thank you for sharing with us. Great content :) I learned a lot

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +1

      Thank you so much for watching and for the kind words! So glad you enjoyed!
      I am currently at the tail end of prep for a new, very similar video - I hope you enjoy that too 😊

    • @lennard21M
      @lennard21M Рік тому +1

      @@jeFF0Falltrades Oh great, I'm looking forward to it. I'll definitely take a look. I'm new to reverse engineering and can really use videos like this :) I have a lot of fun with it

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +1

      @@lennard21M It’s a great time (if not frustrating). So glad to hear it

  • @padraiglogue3568
    @padraiglogue3568 Рік тому +4

    Exceptionally high quality videos you're making here, you have a knack for teaching clearly! I'd love to see you run through some windows kernel exploits. Time to binge watch the rest of your channel

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +2

      Thank you so much! And thanks for the recommendation - I would love to do an exploit video sometime but have to tread carefully due to YT’s rules on educational videos/malicious intent etc…have had issues in the past. But I’ll try to cobble something together sometime.

  • @BillEngwall
    @BillEngwall 3 роки тому +8

    What a champ Jeff, I am new to reverse engineering. Came from reddit, stayed for full hour. Loved it, understood it and it was very interactive too.
    Thanks a lot!! Earned a sub ;)

    • @jeFF0Falltrades
      @jeFF0Falltrades  3 роки тому +1

      The highest praise I could get is knowing this helped someone getting started: Thank you so, so much CureofQuarantine! So glad you enjoyed, and excited to do more soon.

  • @deathscreton
    @deathscreton Рік тому +2

    Recently saw this on Reddit and ended up consuming the whole video during my workday. There was a time I tried my hand at creating a no-cd patch for Ancient Conquest: Quest for The Golden Fleece and hit walls. I may have to give this another shot, thanks to this vid.

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +2

      Awesome! So glad you enjoyed and glad it inspired some tinkering!
      Can’t tell you how many times I walked away from a project out of frustration, only to come back and have a blast with it with fresh eyes - I hope you get some learning and fun out of it.
      Thanks for watching!

  • @sandrovolery1168
    @sandrovolery1168 Рік тому +1

    Aight we've gone full circle. From a game, written in assembly, decompiled to C-code xD
    Nice video

  • @onerimeuse
    @onerimeuse Рік тому +1

    99% assembler code, all by one dude no less. Just one guys passion project.

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому

      This is why I love video games - so much passion, blood, sweat, and tears poured into giving people an escape to have fun and enjoy life.

  • @alexandrepereira6522
    @alexandrepereira6522 Рік тому +1

    Thanks UA-cam for suggesting me this video (and of course you to have created it). One thing that I think would have helped a lot newbies like me to understand a bit more is renaming functions/variables while debugging.

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому

      Thanks for the great feedback! Some others have commented the same and I’d like to think I did a better job in my other videos - I was so excited to get this first one done I totally blanked on it haha. Thanks for watching!

  • @MeteorMetro
    @MeteorMetro 2 роки тому +1

    Thank you! Have been trying to get into this a few times, but have been struggling with Ghidra and couldn't find the resources until now. Great Video!

  • @nola25_
    @nola25_ Рік тому +3

    Thank you for this educational video! I really learned a lot from it. You explained it well and kept pointing out your mistakes, which is essential for a good understanding (especially for beginners like me). I would really like to see more on patching/cracking games.

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +2

      Thanks so much for watching and even more for the great feedback!
      I’ve had a LOT of requests for more game-related reversing, so that one is heavy on my mind for the next videos - I’ll try to find something creative like this but RCT was such a gem; It’s going to be hard to top.

  • @vuurniacsquarewave5091
    @vuurniacsquarewave5091 Рік тому +7

    I'm pretty sure giving readers some kind of a bitfield-like explanation for those values that are added up, essentially flags, would be a lot easier to digest, not to mention being able to switch value representations to binary on the fly might help... but great video! I've only ever worked with 8 and 16-bit CPUs in assembly and it's fun to see how you communicate with the OS on a modern platform.

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +1

      Thanks for the feedback! I took both of these down for consideration in some upcoming primers for beginners - they’re both great points. Thanks for watching!

    • @vuurniacsquarewave5091
      @vuurniacsquarewave5091 Рік тому +1

      @@jeFF0Falltrades I don't think it's a you problem but rather a Microsoft documentation problem. Surely if someone is patching a disassembly there are ways to OR those property flags together and have the assembler take it from there, but it might be cleaner from Microsoft's side, to show the bitfield in addition to a 32-bit hexadecimal value.

  • @stkke93
    @stkke93 Рік тому +1

    Evening intended to play a nostalgic game ended up with you working instead (you workaholic!)
    Also! for it to be too late when you were done .... classic
    Hat off for you.

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +1

      Hahaha my wife still pokes fun at me because I spent much more time on the RE than I did playing (I think I played a single game the day after the upload, and then my nostalgia was fulfilled) 😆.
      No regrets; It was such a fun experiment. Thanks for watching!

  • @dennisanderson8663
    @dennisanderson8663 11 місяців тому +1

    I remember using Dragons RCT trainer. Whoever wrote that is awesome because the number of things you could do to your rides was insane.

    • @jeFF0Falltrades
      @jeFF0Falltrades  11 місяців тому

      I talked about this in my latest RCT video from last week, but I am just gobsmacked by the skill of the early reversers who build tools like the OG RCT trainers with far fewer good RE tools we have today. It’s incredible.

  • @9wattcat
    @9wattcat Рік тому +2

    Nice video! Nog den första reverse engineering videon på UA-cam som har varit rolig att kolla på :)

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +2

      Tusen tack! Det var ju målet då jag skapade kanalen, och det är så häftigt å se så många folk som njuter av ämnet. Tack för att du tittar!

  • @username17234
    @username17234 2 роки тому +3

    Very useful video, a valuable resource for sure, I was surprised to see it was the only video in the channel.

    • @jeFF0Falltrades
      @jeFF0Falltrades  2 роки тому +1

      Thank you for the kind words!
      I’m working on a new one now, but some work and family matters (which I’ll talk about a bit in the next video), have made it prohibitive to upload often this past year. When I do put something out, I want the quality to be there :-). Thanks so much for watching.

  • @cheez3d
    @cheez3d Рік тому +3

    Not sure if someone already pointed this out, but at 45:35 you don't really have to use Ctrl+G in order to see what's at the addresses, because it is already shown to you above the dump views when the instruction referencing the address in question is selected in the CPU view.
    Example:
    dword ptr [rct.00C3E0A8]=20

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +2

      Good spot - yes, I should have highlighted the little “current step” box you’re referring to, but wanted to get into the habit of using the dump view to peruse around while keeping the CPU view the same. This is a good tip, though, and I’ll try to remember to highlight that section of the GUI next time we open the debugger.
      Thanks for watching!

  • @lugadug9475
    @lugadug9475 Рік тому +2

    Thank you dude, with your help, i patched old game called "Neighbours from Hell", so now i can play without "old" fullscreen mode(800x600 window size)

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +1

      Heck yeah! It’s always so nice to hear about people like you who go out and apply this, esp when it comes to patching old school games. Congrats, great job, and thanks for watching!

  • @Wielorybkek
    @Wielorybkek Рік тому +1

    very interesting video! I'm a programmer but I've never touched any of this low level stuff, it was really cool to learn how it works. I did not understand everything but I got the idea of what you were doing and it was satisfying to see the final solution.

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +1

      That’s great feedback! If you’re interested in learning more of the details at a slower pace, I’d recommend checking out my x86 assembly course posted on this channel. I’ll also have another, similar video I’m hoping to publish before year end :-)
      Thanks for taking the time to leave a comment and so glad you enjoyed.

    • @Wielorybkek
      @Wielorybkek Рік тому +1

      @@jeFF0Falltrades Haha if only I had time to learn. :D But thanks for the recommendation, I appreciate the effort.

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +1

      @@Wielorybkek So long as you’re having fun, that’s what counts 👌

  • @ХощенкоАртём
    @ХощенкоАртём Рік тому +1

    I watched this video like a blockbuster movie! Plz, more videos like this!

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +1

      More on the way soon! Have some ideas ready to go - just need to find the time to plan and record them :-). Thanks for watching and feel free to check out the other couple of vids here if they interest you!

    • @ХощенкоАртём
      @ХощенкоАртём Рік тому +1

      @@jeFF0Falltrades Glad to hear it) Next is 3 hour long video about solitaire)

  • @JeremyKingTech
    @JeremyKingTech 2 роки тому +2

    Great stuff! Thanks for the video! I've been on a journey to learn RE for a project and your guide has been super helpful demonstrating logic/workflow to deduce functions. Cheers!

    • @jeFF0Falltrades
      @jeFF0Falltrades  2 роки тому +1

      Thanks so much! So glad you enjoyed and happy to see you moving through that journey!
      Stay tuned for some more RE content coming up in Jan :-)….

  • @jakydibee8569
    @jakydibee8569 3 роки тому +1

    really interesting video!!, much better dive right into the analysis than watch endless just theoretical tutorials

    • @jeFF0Falltrades
      @jeFF0Falltrades  3 роки тому

      Glad to hear it! Hoping to do more when the holiday season comes around.

  • @HarperLee1840
    @HarperLee1840 Рік тому +3

    You tutorial is fun and easy to digest! Hope there's more of it.

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому

      Thanks and so glad you enjoyed it! There are definitely more to come 😄

  • @gopro2027
    @gopro2027 Рік тому +1

    I miss game modding so much. I wanna do it for a job but not really sure where I can do that at. I just liked the puzzle part of it, it was so rewarding.

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому

      There are a good amount of jobs involving reversing or even game-specific reversing and mods as part of game dev/anti-cheat teams! Not to mention the malware analysis route - Hope you find something that suits you regardless! And thanks for watching!

  • @waden9933
    @waden9933 11 місяців тому +1

    Thank you so much!
    I wanted to learn more about reverse engineering this game and everything made sense. Great work with this!
    As an added bonus I wanted to get it running on my Steamdeck and by copying the regedit files to my system I was able to get the game running perfectly on Linux!
    Thanks again!

    • @jeFF0Falltrades
      @jeFF0Falltrades  11 місяців тому

      Oh sick!! So happy to hear that you got it working, and well done on your behalf!
      Thanks so much for watching and if you ever have any RE type questions, feel free to shoot me a comment/DM.

    • @waden9933
      @waden9933 10 місяців тому

      @@jeFF0Falltrades WIll do!

  • @Nick-lu5bn
    @Nick-lu5bn 2 роки тому +2

    What a great tutorial! Thanks, I successfully patched GOG version of RCT with your help, albeit with minor complications.
    I don't know, maybe it's trivial matter, but I think that the following would be useful. 1:16:45 You talk about relative address without clarifying how to actually get it.
    Luckily, by poking around in Ghidra's Code Browser I found what I need. One can patch instruction (Ctrl+Shift+G), replacing absolute address of an old function (0x005840f8, for example) with address of a new one (0x005840a5). I can't say I understand how "CALL 0x005840a5" becomes E8 33 7A FF FF, but it still works.

    • @jeFF0Falltrades
      @jeFF0Falltrades  2 роки тому +2

      Thanks so much for the feedback, for watching, and nice job on patching!
      I also realized - in working on my next video - that I did not spend enough time talking about RVAs vs offsets vs absolute addresses (this will be pivotal in the new video) so I promise I will hit on that in the next one.
      Regarding your question about that instruction, there are a couple of reasons I can imagine you are seeing the hex addresses you are (i.e. 0xFFFF7A33): One might be that you are seeing a relative address jump, so you are seeing a 16-bit address relative to the instruction (so all the highest bits are 0s), or it could be a placeholder value before the real address is linked. In the context of what you were doing, I think it’s probably the latter.
      Thanks for watching and for the great feedback!

  • @subtractaddy
    @subtractaddy 2 роки тому +7

    Wow! Thank you so much for such a clear and approachable tutorial video! One of the hardest things with trying to learn something new and technical like reverse engineering, is feeling like you can do it. I am inspired now so thank you :D

    • @jeFF0Falltrades
      @jeFF0Falltrades  2 роки тому

      So glad to hear you enjoyed, and even more happy to be part of your journey in finding out: YES! You can do it.
      And that goes for everyone here; believe me, if I can, you all can. Keep learning.

  • @raccdust
    @raccdust Рік тому +2

    Great video, very well explained and made easy to understand as a beginner of reverse engineering like myself!

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +1

      So glad to hear!! I’m in the midst of recording a new one for beginners at RE now ;-). Stay tuned! Thank you for watching!

  • @gamehero7198
    @gamehero7198 Рік тому

    this video is awsome exactly what i was looking for, i know stuff about C, C++, asm and basic workings of windows, compiling and memory, but reversing was always such an overwhelming task, im just 20 mins into the video and allready blown away on how good this is

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому

      So glad you enjoy! I’m working on another (very similar one) at the moment - and if you’d like to really dive in, I have an x86 assembly course posted as well.
      Have fun and let me know if you have any questions!

    • @gamehero7198
      @gamehero7198 Рік тому

      @@jeFF0Falltrades such a quick response :D im amazed, yeah i would definitely be interested in an asm course, i mean theres not so much good documentation on it out there (i know basic x64 asm), im only 3 years into programming as of now (or better speaking 1,5-2, 1 year i was just fooling around), wich some might consider early to dive into such, more deeper fields but i just think its so much more fascinating than just plain java script or stuff like that, that to me just seems like talking english to a computer, computer science is the way to go for me :D

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому

      @@gamehero7198 Haha you caught me during some downtime during travel.
      Awesome! Well, take it at your own pace and def don’t stress out over learning everything at once. There’s always more and more to learn later.
      Enjoy your studies too; I was a CS major and loved every bit of it (esp writing only a max of 2 essays in uni 😂)

    • @gamehero7198
      @gamehero7198 Рік тому +1

      @@jeFF0Falltrades I mean Im self taught, I spend to much time at the computer and to little at school 😅. So yeah, my goal is currently to land a job in development. I'm currently aiming at web development. Seems like web devs are always needed but my end goal is earning a living coding C or C++ mainly, but I first wanna add something to my resumee 🤷🏻‍♂️😅

  • @marcelyamamoto9901
    @marcelyamamoto9901 3 роки тому +5

    Man this was amazing, please do more! Im very intrested in start with reverse engineering too, ur video was a nice motivation! Thank you for it and the resources!

    • @jeFF0Falltrades
      @jeFF0Falltrades  2 роки тому +2

      Not sure why I missed this when you first posted it, but thank you!
      I’ve got another couple of ideas planned and am going on holiday here shortly, so hoping to upload another one here soon 🤞

    • @marcelyamamoto9901
      @marcelyamamoto9901 2 роки тому

      @@jeFF0FalltradesRelax man, no stress ;)
      Yesss, already preparing the popcorn 🥳🥳

  • @santiagocalvo
    @santiagocalvo Рік тому +1

    No idea how I got here but I'm subscribing, great video!!!

  • @TakadoGaming
    @TakadoGaming 3 роки тому +2

    I'm really glad I found your channel! Looking forward to more sometime soon!

    • @jeFF0Falltrades
      @jeFF0Falltrades  3 роки тому +1

      Me too! Thanks so much, and hope to put out more soon!

  • @michaelhoefler5118
    @michaelhoefler5118 3 роки тому +4

    Really really great content! I hope to see more in the future! Love the clear explanations

    • @jeFF0Falltrades
      @jeFF0Falltrades  3 роки тому

      Thank you so much; I’m so glad you enjoyed.
      I plan to put out some more content as soon as I can - A bit busy with a new kid on the way for now, but I have some ideas that are staged for some future videos :-)

  • @valhalla_dev
    @valhalla_dev 3 роки тому +2

    Fantastic content buddy, I learned a ton about the mentality/methodology as well as the practical manner that patches are applied.

    • @jeFF0Falltrades
      @jeFF0Falltrades  3 роки тому +1

      Appreciate you watching it through man - thanks for the kind words and hope you enjoyed it.

  • @blagoevski336
    @blagoevski336 Рік тому

    I fell asleep not knowing that that i didn't turn off my phone and slept through this entire video.

  • @TheAces1979
    @TheAces1979 Рік тому +1

    Bookmarked this. You're an excellent instructor! Many thanks!

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому

      You are so kind, thank you! So glad you got something out of it.
      Hope to have a new video out shortly! So glad you enjoyed.

  • @bigapple89
    @bigapple89 Рік тому +1

    Great video. I wish you showed a bit more of the gameplay in its new fullscreen glory

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому

      My wife loves to poke fun at me because I barely got a chance to play following this (I did play for a good few days though) - I was too excited about this whole exploration that I was so much more focused on getting the video out.
      So glad you enjoyed!

  • @eitantal726
    @eitantal726 Рік тому +1

    This video makes me miss my University days...

  • @tetraphobie
    @tetraphobie 2 роки тому +3

    I was looking for an introductory Ghidra tutorial and came across your video.
    Really like how you explain your thought process making the whole process very easy to follow and understand.
    I'd certainly recommend this video to any C/C++/assembly programmer interested in reverse engineering as an accessible entry point.
    Saw that Ghidra has a debugger now. I wonder how good it is compared to x64dbg. :)

    • @jeFF0Falltrades
      @jeFF0Falltrades  2 роки тому +2

      So glad you enjoyed! I really appreciate the feedback.
      I have another video idea I am working on right now that I hope to improve in terms of a “reversing beginner’s tutorial” based on lessons learned from publishing this video.
      And FWIW, I still enjoy using x64dbg for now; But probably just because I know where everything is :-)

    • @tetraphobie
      @tetraphobie 2 роки тому +2

      ​@@jeFF0Falltrades That's very cool! I'll likely give it a watch when it's out. Best of luck with your work! :)

    • @tetraphobie
      @tetraphobie 2 роки тому +1

      Small update: inspired by your video I tried doing some reverse engineering of an old MS-DOS app with Ghidra. But it turns out Ghidra has incomplete support for 16-bit real mode and gets confused by segment registers and far pointers. Either that or I'm missing something. Oh well. 😂

  • @OthmanAlikhan
    @OthmanAlikhan 3 роки тому

    Thanks for taking the effort in making a rather lengthy and quality video. I've learned quite a few things from watching =)

    • @jeFF0Falltrades
      @jeFF0Falltrades  3 роки тому

      Thank you so much for watching and for the kind words. I really tried to make this as accessible as possible - I’m glad to hear it was helpful!

  • @XxXjujio2013XxX
    @XxXjujio2013XxX Рік тому +1

    Thanks for the video. I... just... one day I gonna see it, but not today.

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому

      Take your time...I’ll be here ¯\_(ツ)_/¯ 😁

  • @bommijn
    @bommijn Рік тому +1

    Was fun to follow allong, thanks for the video :) Learned allot as well.

  • @sanderbos4243
    @sanderbos4243 Рік тому +1

    Amazing tutorial, I'm sure I'll be rewatching it again fully in the future! :)

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +1

      Thanks so much - so glad you enjoyed it and hope you continue to get something out of it. Something new coming to the channel this week, too ;-)

  • @skullsNscalps
    @skullsNscalps 8 місяців тому +1

    My knowledge didn't go beyond "Mitochondria is the power house of the cell."

  • @TeamUnpro
    @TeamUnpro Рік тому +1

    Fantastic tutorial, hope you dont suffer from burnout issues like I do lol, the vids 2 years old so I suppose you're still kicking, so keep at it :) Subbed

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +1

      Nope! In fact, just about to record a very similar video this week! Still loving doing this channel, as opposed to my last one which did very much become a burnout.
      Thanks so much for the sub and for watching!

    • @TeamUnpro
      @TeamUnpro Рік тому +1

      Looking forward to the vid!@@jeFF0Falltrades

  • @l3lackoutsMedia
    @l3lackoutsMedia 3 роки тому

    This is the first reverse engineering ghidra video, that seems to click instantly for me.

    • @jeFF0Falltrades
      @jeFF0Falltrades  3 роки тому

      Glad to hear it!! Thanks for watching and hope to have a new video out soon.

  • @taguetrash
    @taguetrash Рік тому +1

    34:50 You searched for "20" instead of 32 (0x20) - the proper result would be SM_CXSIZEFRAME, the thickness of the border around the window, not scrollbars.
    Awesome tutorial btw!

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому

      Thank you! Yes - other folks pointed this out too and I can’t believe I missed it during recording because I *literally* said something along the lines of “and here are the values in hex”
      Thanks for watching!

    • @taguetrash
      @taguetrash Рік тому +1

      @@jeFF0Falltrades My bad, i didn't see those comments until after I wrote mine! And thank you very much for making the video!

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +1

      @@taguetrash Hey not at all! I don’t expect you to read every one, but I do try to put corrections in the description (in this first video) or my pinned comment (all other videos)

  • @RichardBejtlich
    @RichardBejtlich 4 місяці тому +1

    You did a great job explaining all of this. TYVM. 👏

    • @jeFF0Falltrades
      @jeFF0Falltrades  4 місяці тому

      @@RichardBejtlich Thank you so much for the kind words and so glad you enjoyed!

    • @jeFF0Falltrades
      @jeFF0Falltrades  3 місяці тому

      @@RichardBejtlich HOLD ON!

    • @jeFF0Falltrades
      @jeFF0Falltrades  3 місяці тому

      @@RichardBejtlich I just realized: Are you Corelight’s Richard Bejtlich?!
      EDIT: I’m now 99% certain you are! I just wanted to let you know that I appreciate your work, especially as believe it or not, I am a successor to your work on the CIRT at GE Aero 😂 I was going crazy wondering why your name sounded so familiar and that’s why!

  • @timfennis91
    @timfennis91 Рік тому +1

    Thanks for making this video. I've always been curious about reverse engineering and this was definitely a very good introduction. If I had to offer any criticism I would agree with some others that naming the variables would have been great, and for me personally the tempo could have been higher. You obviously worried a lot that this video would be too difficult for your audience but I think it's fine.

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому

      Thank you for the feedback! Some others mentioned the same, and I agree - I’ve gotten better at this with my more recent videos (I think I was just too excited when filming this first one that it just fell right out of my head to label everything).
      Thanks for watching!

  • @santiagomanuel6843
    @santiagomanuel6843 2 місяці тому +1

    Thanks for the guides in the description

    • @jeFF0Falltrades
      @jeFF0Falltrades  2 місяці тому

      @@santiagomanuel6843 Of course! Hope you find it all helpful in your journey!

  • @ByronHadley1
    @ByronHadley1 3 роки тому +1

    Five star stuff. Thanks so much for sharing. Easy to follow and extremely educational!

    • @jeFF0Falltrades
      @jeFF0Falltrades  3 роки тому

      Thank you so much, Byron! So glad to hear you thought so. Looking forward to making more once I finish a couple of projects :-)

  • @Ataraxia_Atom
    @Ataraxia_Atom Рік тому +1

    This is freaking awesome! I loved this game

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому

      It really does so much for the nostalgic soul - Thanks so much for watching!

  • @Block57
    @Block57 Рік тому +3

    26:28 Didn't see anyone comment on this yet! If you haven't figured it out by now, you can create an Enum type and assign all the values normally, and Ghidra will actually automatically show all the ORing instead of just the constant! (At least in the code view)
    For preexisting Windows types it may already have that defined as a Typedef, so you may want to just create a new one and substitute it out (There's a right click option now, but you can drag and drop types to replace every usage)

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +1

      Thanks so much for this! I actually learned about this feature several months after this video was uploaded (I had just switched to Ghidra from IDA around the time I uploaded this), and I wish I had known it so much earlier.
      Since then, I've used it a few times for both Enums and structs (like in the latest RE video I posted) and it's so handy. I continue to learn so many nice features of Ghidra just through other people giving me these tips haha.
      Thanks for watching and for the great tips! I hope it's helpful to others as well.

  • @TheWayManREAL
    @TheWayManREAL 2 роки тому

    this actually is a good tutorial not one of those 5 min vids that doesn't go in-depth on anything

    • @jeFF0Falltrades
      @jeFF0Falltrades  2 роки тому +1

      Thank you! So happy to hear it was helpful.
      I’ve got another couple planned and am going on holiday here shortly, so hoping to upload another one here soon 🤞

    • @TheWayManREAL
      @TheWayManREAL 2 роки тому

      @@jeFF0Falltrades I think doing a game like that was a perfect example because most people who do this are looking at games and messing around with old games like RCT

  • @JellyLancelot
    @JellyLancelot Рік тому +2

    Truly an awesome video, so interesting and such an engaging topic.

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому

      So glad you enjoyed! Hope you continue to enjoy the channel, and thanks so much for watching

  • @DrixoGaming
    @DrixoGaming 3 роки тому +1

    Well just saying it's was realy good to watch even i don't have any tips to give but i was wanted to say how i appreciat the flow and everything it was interresing.

    • @jeFF0Falltrades
      @jeFF0Falltrades  3 роки тому

      Thank you so much, Dj-Xo! I’m so happy you enjoyed.

  • @Tehploe
    @Tehploe Рік тому +1

    This was a lot of fun! Great video.

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому

      So glad you enjoyed! Thanks so much for watching and for the kind words!

  • @The_Makers_Prerogative
    @The_Makers_Prerogative Рік тому

    I enjoyed following your workflow, Excellent Video!

  • @Pi7on
    @Pi7on Рік тому +1

    Very informative, thanks for documenting the whole process!

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +1

      Thanks for watching and so glad you got something out of it! More coming soon :-)

    • @Pi7on
      @Pi7on Рік тому +1

      @@jeFF0Falltrades glad to hear it! I'm definitely keeping an eye out for your vids!
      Personally I love watching people reverse engineering a game to fix an abscure bug.
      Do you know mattkc and exilelord? They made a video on lego island and guitar hero respectively, documenting their journey reversing the game. I love this stuff

  • @erickuhn3500
    @erickuhn3500 8 місяців тому +1

    Well done! I enjoyed watching this video a lot.

    • @jeFF0Falltrades
      @jeFF0Falltrades  8 місяців тому

      Thank you so much and glad to hear! If you haven’t seen the spiritual successor to this one (the latest RCT vid on the channel), you’d likely enjoy that one as well - much stranger but more interesting 😂
      Thanks so much for watching and glad you enjoyed!

  • @OrIoN1989
    @OrIoN1989 11 місяців тому +1

    Great video. I am partially on the other side trying to figure out how to make the code less hackable. But I understand its also a two edged sword if you want to make a fix 20 years down the road.

    • @jeFF0Falltrades
      @jeFF0Falltrades  11 місяців тому +1

      Nice! Yes, it’s always a balancing act, and more and more difficult to obfuscate away code, but there are several techniques employed today to do so by both smaller and larger studios.
      Thanks for the kind words and for watching!

  • @ferna2294
    @ferna2294 Рік тому +1

    Beautiful. This will be very useful. Thank you so much!

  • @ilhamriskiwibowo
    @ilhamriskiwibowo 3 роки тому +1

    This is amazing work, bcs use python too for patching. I learn from open roller coaster tycoon too.

  • @callfordoody6793
    @callfordoody6793 Рік тому +1

    When is the next video coming out? Im terrible at reversing games and game engines so Im excited to see how you do it.

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому

      I’m hoping to record it in the upcoming week! Just wrapped up writing for it over the last couple of weeks :-). I hope you enjoy it…it will be very similar to this one

  • @kinggalactix
    @kinggalactix Рік тому +1

    This is a pretty interesting video so far. Right now, I'm trying to learn how to decrypt and XEX file (Xbox Executable). And thus far, I'm kinda struggling on finding anything useful. All I see are lots of random functions and such, and barely any code. But this guide is a pretty good basis for me getting started.

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +1

      Good stuff! I know XEX is a bit more of its own beast, but feel free to check out my other RE videos here if you need help with other basic concepts behind reversing.

    • @kinggalactix
      @kinggalactix Рік тому +1

      @@jeFF0Falltrades I'll certainly take a look! from what I know about my XEX, it's going to take way longer than 2 months to fix a bunch of stuff. But at the moment, I'm just looking to find certain sections of code.

    • @kinggalactix
      @kinggalactix Рік тому +1

      I do believe as I play through the game, more of the code will inevitably unlock.

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +1

      @@kinggalactix Good luck! And thanks for watching!

    • @kinggalactix
      @kinggalactix Рік тому +1

      @@jeFF0Falltrades No, thank you for the guide! Good luck to you, too.

  • @omdangy
    @omdangy 2 роки тому +1

    Brilliant tutorial! You're a very good teacher, thank you

    • @jeFF0Falltrades
      @jeFF0Falltrades  2 роки тому

      Thank you so much for your kind words - I hope it was helpful to you!

  • @ezmil4028
    @ezmil4028 3 роки тому +2

    I really liked this video. I would love to see more like this. Just a question: is it better to use old games like this because you dont have to focus on protection mechanisms?

    • @jeFF0Falltrades
      @jeFF0Falltrades  3 роки тому +1

      Glad to hear it!
      And yeah, IMO - at least starting out - it’s easier to start with older games: Less complex, fewer protections to worry about, and more straightforward code most of the time. A good springboard to move to modern/more complex games in the future.
      Thanks for watching!

  • @m3taldragon1
    @m3taldragon1 Рік тому +2

    Bruh... I'm colorblind and I never knew it. 53:30 just blew my mind.

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому

      I am glad you found out man! I believe you can change those colors in preference, but I’m not 100% sure - I don’t have my laptop with me ATM but I’ll try to remember to follow up with you after I can check.

  • @MarshmallowFlame
    @MarshmallowFlame Рік тому +1

    Very nice tutorial! Fun project and good explanations, myself I've have programmed quite a bit in high level langs like Python but always been curious to lower level stuff as well!
    PS tänkte först inte på att alla menyerna var på svenska 😁

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому +1

      Thank you so much - so glad you enjoyed! Och hoppas videon hjälpte till med förståelsen lite!

  • @JT-xu1qd
    @JT-xu1qd Рік тому +1

    It's easy to see why this game was so great, it was stacked with FUN_

  • @mohssineelharfi5909
    @mohssineelharfi5909 3 роки тому +1

    sure thing, I enjoyed it a lot, thx for this awsome content

  • @ganjamindanklin8536
    @ganjamindanklin8536 2 роки тому +1

    Great video, although if I was you I would've renamed some of the local variables in Ghirdra (it's been a while since I did reverse engineering, but right click the symbol in the disassembled pseudocode and then click rename from the context menu), and I'd also rename some of the anonymous functions to make things more clear. You don't need to work blindly! Just figure out what something might be and give it a proper name, that way you'll keep better track of everything what's going on. Also if I was you I would've also used the "Rollercoaster Tycoon" string to find the place where CreateWindowExA is called. It just makes things so much more convenient, and less break points to be hit in the debugger. :D But anyway, very good job! BTW, I'm no expert in reverse engineering although I've done some crackmes etc in the past, I'm mostly just a coder.

    • @jeFF0Falltrades
      @jeFF0Falltrades  2 роки тому +1

      Yeah someone else commented the same and I agree; it was a bit of an oversight on my part.
      What’s funny is I usually go crazy naming things when working on a project, but this being my first video on the topic, I think I was way too focused on everything else going well to a fault. But yeah, of all things to include in a tutorial…naming as you go is at the top of the list haha.
      Thanks for watching and hope you enjoyed!

    • @ganjamindanklin8536
      @ganjamindanklin8536 2 роки тому +1

      ​@@jeFF0Falltrades I did enjoy it! Personally I would like to someday recover the source code of an older PS2 game, 007 Nightfire, because the PC version isn't the same as the PS2 or Xbox version. Only the PS2 version contains debug symbols in the binaries, so recovering the source code and rebuild it on PC should be in the realm of possibilities, just requires some work though and probably some knowledge about PS2's architecture. :D

    • @jeFF0Falltrades
      @jeFF0Falltrades  2 роки тому

      @@ganjamindanklin8536 That sounds like an awesome project; So many good memories of nights playing multiplayer Nightfire!

    • @ganjamindanklin8536
      @ganjamindanklin8536 2 роки тому

      @@jeFF0Falltrades Yeah I loved that game when I was a kid, I used to play it with my cousin in 2-player mode, sometimes alone against bots. It was even funnier to play it in 4-player mode at my friend's birthday party, he had the glorious multitap for PS2. Anyway the single player campaign is fun as well, even though it's very short. 🤣 It was always a game I wanted to experience with a Keyboard and Mouse, but the PC version didn't offer the same experience. 😆AFAIK Xbox, Gamecube and PS2 versions were made by Eurocom, and the PC port by Gearbox Software.

  • @HikikomoriDev
    @HikikomoriDev Рік тому +1

    Ghidra is kinda cool, it looks classy, like some Win2000 or NT 4 application.

  • @Zesserie
    @Zesserie Рік тому +1

    Den här datorn, what a nice language you have your windows in! I prefer english though :D
    Have my sub!

  • @matthewbascom
    @matthewbascom 10 місяців тому

    Thank you for sharing all this work. A nice complement to this video would be your design process for the patch python script. Also, how did you design the two key-value pairs within the PATCHES dictionary?
    Is there a way to record zoomed in on the screen where you're performing edits? It would be nice if the focus of your work was much bigger to make it easier for the audience to read & watch.

  • @szymoniak75
    @szymoniak75 Рік тому

    The question is - why did they include this resolution restriction, and why the "correct" function wasn't used in the first place? Wondering if there are some assumptions based on that in other places in the code. Anyways it was fun to watch, learned a few things, thanks!

  • @benjcalderon
    @benjcalderon 3 роки тому +1

    awesome video! thank you for this 😃 I'm thinking about reverse engineering the software to program a HAM Radio... probably a big bite for starting but this gives me a lot of info to using ghidra and the debugger bight actually come quite handy!

    • @jeFF0Falltrades
      @jeFF0Falltrades  3 роки тому

      Hey thanks a lot Benjamín!
      I hope it helps you in your journey to doing some RE on the HAM radio software!
      That sounds awesome, btw - if you post anything about it, please let me know!

  • @wmyttmlimvty
    @wmyttmlimvty Рік тому +1

    Fun fact: Exactly this 0:56 happened to my browser for no reason (I'm not kidding) while I was watching this video and I had to re-open it (luckly just happened one time :b)

  • @andrewkowalczyk1156
    @andrewkowalczyk1156 3 роки тому +2

    Hey the OpenRCT2 project would love to have you, also they have full resolution working really really nice, but I think you've got that covered haha

    • @jeFF0Falltrades
      @jeFF0Falltrades  3 роки тому +2

      Thank you so much for the kind words, Andrew! That means a lot.
      If I had more time to dedicate to open-source projects, I probably would. Perhaps one day, once my plate gets a little lighter :-).

  • @galihriskipratama3631
    @galihriskipratama3631 Рік тому +1

    my 1 bit brain can't process what is happening, but I enjoy it

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому

      Congratulations - You have the spirit of a seasoned reverser! 😂

  • @coolbrotherf127
    @coolbrotherf127 Рік тому +1

    Such a great video. I've been programming C/C++ for a few years now, but it's hard to find real tutorials for this kind of stuff that actually explain things well. Also, are you Norwegian? I noticed your Windows UI was in Morrison.

    • @jeFF0Falltrades
      @jeFF0Falltrades  Рік тому

      So glad you enjoyed and got something out of it!
      And I’m not (though my wife is) - My PC is in Swedish, a second language of mine, but I am an American.

    • @coolbrotherf127
      @coolbrotherf127 Рік тому

      @@jeFF0Falltrades That makes sense, and I have no idea why my phone replaced Norwegian with Morrison lol

  • @omerbennahum1903
    @omerbennahum1903 2 роки тому +1

    Beautiful demo. Thanks!

  • @Alfakatt
    @Alfakatt Рік тому +2

    Love the swedish interface 😎