Hello, I just wanted to thank you for your excellent videos and work, the way that you teach is great, remarking on those little stuff like keyboard shortcuts or menus, that although they may be usual on the daily work with this type of software, for beginners isn't so predictable or intuitive (especially if one doesn't know the vocabulary related to this field) so your way of approaching is great for us. It's a privilege to be able to learn from your work, thank you. Hope my english isn't so broken XD
@42:02 Just a heads up (you might already know this): you needed to change the value of the ZF register (Zero Flag). The "test" instruction sets that. Then the "je" reads the ZF value. So you could have still changed the jump behavior without reloading. Good video!
IDA has an option to re-examine/reformat a section as data instead of code so embedded text strings show up easier. I'm hoping Ghidra probably has something.
it will be that you did not have you studio video at the bottom corner of the screen. You can pop it up when there is the need but it is very distracting to really focus
You could also patch the CrackMe0x00 with Ghidra, so the check always evaluate true, and then export the executable to have an executable that always display "Password ok" even if you insert an incorrect one (: Anyway good videos!
I love Ghidra! Most of my channel is dedicated to it! And patching executables is by far my favorite thing about it! That and extracting embedded payloads and saving them to disk!
@@stryker2k2 Yeap, I mean you should do a video on patching too because, if I'm right, I didn't find one with this Ghidra feature. Or maybe there is but I didn't find it xD Have a nice coding and day!
I did a lot of everything during my military career. Everything from being in a support element, to front lines patrol, parachuting out of airplanes, repelling out of helicopters, and being in places that we 'never were at'. It was an amazing career.
i want to do source level debugging in x64dbg. i tried searching google but o help. I can debug only with assembly my source file not showing in the source tab
Help... I want to reverse engineer a Patch... So I have the offsets to edit on HXD provided by the person who made the patch... Now how to I find that Offset into x64bg so I can see what string he looked for to patched it.
Most program load at 0x40000000 (or something like that). Open up a Programming Calculator and add the offset to 0x40000000. Likewise, you can also use a program like PEStudio or CFFExplorer to view exactly where the program starts.
I have a software that could not crack it. And also could not find solution for it. If I send you the software, would you mind creating a tutorial on how to crack it ?
Is there anyone who has tried "debugging" Fractal Software Chaotica? I have tried a while now but don't really manage to do it. Would be really thankfull for hints ;)
Nice one. My challenge to you crack Vectric Aspire 11.5 ...... I've seen cracked ones but they made it so complicated, so hope with your knowledge and experience you could do a big favor to many of us.
x64dbg with the plugins is so flipping amazing!!! Does not get enough love! I wish I had your skills guys!
Look up "Denuvo cracking tutorial" by voksi... He uses x64dbg exclusively and Denuvo is 100% the toughest protection in existence.
@@Matt-ir1ky I looked up that tutorial! WOW WOW WOW WOW WOW!
Can you suggest some plugins?
master, I gave a huge respect for this. You are best x64dbg teacher ever. I love it thanks for all master
Unreal, thanks for sharing. Definitely gonna have a shot at those cracks
Hello, I just wanted to thank you for your excellent videos and work, the way that you teach is great, remarking on those little stuff like keyboard shortcuts or menus, that although they may be usual on the daily work with this type of software, for beginners isn't so predictable or intuitive (especially if one doesn't know the vocabulary related to this field) so your way of approaching is great for us. It's a privilege to be able to learn from your work, thank you. Hope my english isn't so broken XD
Thanks a ton! I try to keep it as simple as possible! I'm glad you enjoyed it!
@@stryker2k2 Hello , Please I need your help.
This was excellent content. You did many things right like enlarging the UI, showing through example, etc. Thank you for this.
at 1:47 I think you meant to say 32 bit.
Wow, yep... you're 100% correct. Good catch!
@42:02 Just a heads up (you might already know this): you needed to change the value of the ZF register (Zero Flag). The "test" instruction sets that. Then the "je" reads the ZF value. So you could have still changed the jump behavior without reloading.
Good video!
nice suggestion from yt! new sub indeed! Thanks for the great explanation and teaching skills!
IDA has an option to re-examine/reformat a section as data instead of code so embedded text strings show up easier.
I'm hoping Ghidra probably has something.
it will be that you did not have you studio video at the bottom corner of the screen. You can pop it up when there is the need but it is very distracting to really focus
Thank you for the input 😊
i really like this video. Thank you so much ^^
Dewmi is back🤩
Hi Dewmi
helooooooo@@stryker2k2
This is super useful, thank you!
I'm glad you liked it!
You could also patch the CrackMe0x00 with Ghidra, so the check always evaluate true, and then export the executable to have an executable that always display "Password ok" even if you insert an incorrect one (:
Anyway good videos!
I love Ghidra! Most of my channel is dedicated to it! And patching executables is by far my favorite thing about it! That and extracting embedded payloads and saving them to disk!
@@stryker2k2 Yeap, I mean you should do a video on patching too because, if I'm right, I didn't find one with this Ghidra feature. Or maybe there is but I didn't find it xD
Have a nice coding and day!
Thanks a lot, great start tutorial ❤
I'm glad you like it! I just published another one today :)
Great video and work, appreciate your content and style very much - thanks a lot 👍
Amazing video!
6:20
Hello sir, why do you add 4 to the stack rather than subtract? I thought stack grow towards low memory addresses.
I may have made a mistake in saying that. The main goal was to demonstrate how I use x64dbg; so I appologize if I slipped on some of the particulars.
@@stryker2k2 ok, thanks for clarifying.
Very good-guy work.
0x0A is Line Feed, not Carriage Return (which is 0x0D)
Yes, yes it is. Thank you for the correction.
Thank you for your service, Sir. What was your MOS in the military career?
I did a lot of everything during my military career. Everything from being in a support element, to front lines patrol, parachuting out of airplanes, repelling out of helicopters, and being in places that we 'never were at'. It was an amazing career.
where did you write your assembly code at?
You can find my asm code at: github.com/stryker2k2/dbg-demo/blob/master/assem/assem_0x00.asm
goated video, thanks
My pleasure! I love making walk-thrus like this :D
when i klick the enter button in the terminator it quits and i don t know why
i want to do source level debugging in x64dbg. i tried searching google but o help. I can debug only with assembly my source file not showing in the source tab
Hello, can you give me exe file with reverse engineering, this is 30 days trial but working full. can you please help me.
You can find the executables at: github.com/stryker2k2/dbg-demo/tree/master/crackmes
Help... I want to reverse engineer a Patch...
So I have the offsets to edit on HXD provided by the person who made the patch...
Now how to I find that Offset into x64bg so I can see what string he looked for to patched it.
Most program load at 0x40000000 (or something like that). Open up a Programming Calculator and add the offset to 0x40000000. Likewise, you can also use a program like PEStudio or CFFExplorer to view exactly where the program starts.
Thank you so much.
I have a software that could not crack it. And also could not find solution for it.
If I send you the software, would you mind creating a tutorial on how to crack it ?
Is there anyone who has tried "debugging" Fractal Software Chaotica? I have tried a while now but don't really manage to do it. Would be really thankfull for hints ;)
Nice one.
My challenge to you crack Vectric Aspire 11.5 ...... I've seen cracked ones but they made it so complicated, so hope with your knowledge and experience you could do a big favor to many of us.
Weird to hear an human in this video instead of stupid useless and horrible sounds (some call it "music").
Very good content.
Thanks! I started off in this industry learning from those exact videos and promising myself to make better ones! It's my way of giving back 😊
HOW CAN I TALK TO YOU ?
can you crack one if i send it to you?
drive.google.com/file/d/1xp1XN-E9fh1dXnhZCN3NmVHJ6F7R1v8y/view?usp=sharing
here it is
Sir, Please crack expert high score 5.0 and PDF 4+ database
I can do that... if Adobe pays me to do for a Bug Bounty program. But I won't do it as UA-cam video.
bro this is mlaware
Nope. But, you should treat every executable as if it is malware and always launch it in a network-less virtual machine. So... yes? But no.
@@stryker2k2 Ok thank u it works 👍I love your video
hi, can you help me with a difficult program to crack it? pls?
Its Ghidra not Gidra
lmao! Shhhhh... don't tell anyone.