x64dbg Demo | CrackMe Challenges

Поділитися
Вставка
  • Опубліковано 11 лис 2024

КОМЕНТАРІ • 67

  • @LukeAvedon
    @LukeAvedon 2 роки тому +7

    x64dbg with the plugins is so flipping amazing!!! Does not get enough love! I wish I had your skills guys!

    • @Matt-ir1ky
      @Matt-ir1ky 2 роки тому +4

      Look up "Denuvo cracking tutorial" by voksi... He uses x64dbg exclusively and Denuvo is 100% the toughest protection in existence.

    • @LukeAvedon
      @LukeAvedon 2 роки тому +2

      @@Matt-ir1ky I looked up that tutorial! WOW WOW WOW WOW WOW!

    • @ShakilShahadat
      @ShakilShahadat 2 роки тому +2

      Can you suggest some plugins?

  • @berkebicer5140
    @berkebicer5140 Рік тому +4

    master, I gave a huge respect for this. You are best x64dbg teacher ever. I love it thanks for all master

  • @pancakeboy12
    @pancakeboy12 2 роки тому +5

    Unreal, thanks for sharing. Definitely gonna have a shot at those cracks

  • @zxenon555
    @zxenon555 Рік тому +1

    Hello, I just wanted to thank you for your excellent videos and work, the way that you teach is great, remarking on those little stuff like keyboard shortcuts or menus, that although they may be usual on the daily work with this type of software, for beginners isn't so predictable or intuitive (especially if one doesn't know the vocabulary related to this field) so your way of approaching is great for us. It's a privilege to be able to learn from your work, thank you. Hope my english isn't so broken XD

    • @stryker2k2
      @stryker2k2  Рік тому

      Thanks a ton! I try to keep it as simple as possible! I'm glad you enjoyed it!

    • @tahargermanni6205
      @tahargermanni6205 Рік тому

      @@stryker2k2 Hello , Please I need your help.

  • @drygordspellweaver8761
    @drygordspellweaver8761 Рік тому +4

    This was excellent content. You did many things right like enlarging the UI, showing through example, etc. Thank you for this.

  • @JohnSmith-he5xg
    @JohnSmith-he5xg 2 роки тому +1

    @42:02 Just a heads up (you might already know this): you needed to change the value of the ZF register (Zero Flag). The "test" instruction sets that. Then the "je" reads the ZF value. So you could have still changed the jump behavior without reloading.
    Good video!

  • @hadibq
    @hadibq Рік тому +1

    nice suggestion from yt! new sub indeed! Thanks for the great explanation and teaching skills!

  • @dewmi4403
    @dewmi4403 10 місяців тому +3

    Dewmi is back🤩

    • @stryker2k2
      @stryker2k2  10 місяців тому +1

      Hi Dewmi

    • @dewmi4403
      @dewmi4403 10 місяців тому

      helooooooo@@stryker2k2

  • @breachbase
    @breachbase Рік тому +1

    This is super useful, thank you!

    • @stryker2k2
      @stryker2k2  10 місяців тому

      I'm glad you liked it!

  • @MackNNations
    @MackNNations Рік тому +1

    IDA has an option to re-examine/reformat a section as data instead of code so embedded text strings show up easier.
    I'm hoping Ghidra probably has something.

  • @ani-zxk
    @ani-zxk 7 місяців тому +2

    at 1:47 I think you meant to say 32 bit.

    • @stryker2k2
      @stryker2k2  7 місяців тому +1

      Wow, yep... you're 100% correct. Good catch!

  • @aniketbose4360
    @aniketbose4360 Рік тому

    i want to do source level debugging in x64dbg. i tried searching google but o help. I can debug only with assembly my source file not showing in the source tab

  • @anntakamaki1960
    @anntakamaki1960 Рік тому +1

    6:20
    Hello sir, why do you add 4 to the stack rather than subtract? I thought stack grow towards low memory addresses.

    • @stryker2k2
      @stryker2k2  Рік тому

      I may have made a mistake in saying that. The main goal was to demonstrate how I use x64dbg; so I appologize if I slipped on some of the particulars.

    • @anntakamaki1960
      @anntakamaki1960 Рік тому +1

      @@stryker2k2 ok, thanks for clarifying.

  • @_sayroto_
    @_sayroto_ Рік тому

    when i klick the enter button in the terminator it quits and i don t know why

  • @necroxyama
    @necroxyama 2 роки тому +1

    You could also patch the CrackMe0x00 with Ghidra, so the check always evaluate true, and then export the executable to have an executable that always display "Password ok" even if you insert an incorrect one (:
    Anyway good videos!

    • @stryker2k2
      @stryker2k2  2 роки тому +1

      I love Ghidra! Most of my channel is dedicated to it! And patching executables is by far my favorite thing about it! That and extracting embedded payloads and saving them to disk!

    • @necroxyama
      @necroxyama 2 роки тому

      @@stryker2k2 Yeap, I mean you should do a video on patching too because, if I'm right, I didn't find one with this Ghidra feature. Or maybe there is but I didn't find it xD
      Have a nice coding and day!

  • @niinuetey9878
    @niinuetey9878 6 місяців тому +1

    it will be that you did not have you studio video at the bottom corner of the screen. You can pop it up when there is the need but it is very distracting to really focus

    • @stryker2k2
      @stryker2k2  5 місяців тому

      Thank you for the input 😊

  • @chauncey5859
    @chauncey5859 Рік тому +2

    Amazing video!

  • @hoangvantruong2942
    @hoangvantruong2942 2 роки тому +1

    i really like this video. Thank you so much ^^

  • @simpleperson3234
    @simpleperson3234 Рік тому +1

    Thank you for your service, Sir. What was your MOS in the military career?

    • @stryker2k2
      @stryker2k2  Рік тому +1

      I did a lot of everything during my military career. Everything from being in a support element, to front lines patrol, parachuting out of airplanes, repelling out of helicopters, and being in places that we 'never were at'. It was an amazing career.

  • @speedygonzales1335
    @speedygonzales1335 Рік тому +1

    Great video and work, appreciate your content and style very much - thanks a lot 👍

  • @debnathmriganka2010
    @debnathmriganka2010 3 місяці тому +1

    Hello, can you give me exe file with reverse engineering, this is 30 days trial but working full. can you please help me.

    • @stryker2k2
      @stryker2k2  3 місяці тому

      You can find the executables at: github.com/stryker2k2/dbg-demo/tree/master/crackmes

  • @rikkoo
    @rikkoo Рік тому +1

    goated video, thanks

    • @stryker2k2
      @stryker2k2  Рік тому

      My pleasure! I love making walk-thrus like this :D

  • @aleahmontes8019
    @aleahmontes8019 9 місяців тому +1

    where did you write your assembly code at?

    • @stryker2k2
      @stryker2k2  9 місяців тому

      You can find my asm code at: github.com/stryker2k2/dbg-demo/blob/master/assem/assem_0x00.asm

  • @moazelsawaf2000
    @moazelsawaf2000 Рік тому +1

    Thanks a lot, great start tutorial ❤

    • @stryker2k2
      @stryker2k2  Рік тому

      I'm glad you like it! I just published another one today :)

  • @RenoRivsan
    @RenoRivsan 7 місяців тому +1

    Help... I want to reverse engineer a Patch...
    So I have the offsets to edit on HXD provided by the person who made the patch...
    Now how to I find that Offset into x64bg so I can see what string he looked for to patched it.

    • @stryker2k2
      @stryker2k2  3 місяці тому

      Most program load at 0x40000000 (or something like that). Open up a Programming Calculator and add the offset to 0x40000000. Likewise, you can also use a program like PEStudio or CFFExplorer to view exactly where the program starts.

  • @P-G-77
    @P-G-77 Рік тому +1

    Very good-guy work.

  • @barongello
    @barongello Рік тому +1

    0x0A is Line Feed, not Carriage Return (which is 0x0D)

    • @stryker2k2
      @stryker2k2  10 місяців тому

      Yes, yes it is. Thank you for the correction.

  • @alisadeqi1883
    @alisadeqi1883 2 роки тому

    I have a software that could not crack it. And also could not find solution for it.
    If I send you the software, would you mind creating a tutorial on how to crack it ?

  • @fred700
    @fred700 Рік тому

    Is there anyone who has tried "debugging" Fractal Software Chaotica? I have tried a while now but don't really manage to do it. Would be really thankfull for hints ;)

  • @alisadeqi1883
    @alisadeqi1883 2 роки тому

    Thank you so much.

  • @jeromenowe9331
    @jeromenowe9331 Рік тому +1

    Weird to hear an human in this video instead of stupid useless and horrible sounds (some call it "music").
    Very good content.

    • @stryker2k2
      @stryker2k2  Рік тому

      Thanks! I started off in this industry learning from those exact videos and promising myself to make better ones! It's my way of giving back 😊

  • @maxsmith2320
    @maxsmith2320 Рік тому

    Nice one.
    My challenge to you crack Vectric Aspire 11.5 ...... I've seen cracked ones but they made it so complicated, so hope with your knowledge and experience you could do a big favor to many of us.

  • @miraclecharacter_
    @miraclecharacter_ 5 місяців тому

    HOW CAN I TALK TO YOU ?

  • @gauravrajak007
    @gauravrajak007 7 місяців тому +1

    Sir, Please crack expert high score 5.0 and PDF 4+ database

    • @stryker2k2
      @stryker2k2  3 місяці тому

      I can do that... if Adobe pays me to do for a Bug Bounty program. But I won't do it as UA-cam video.

  • @ElenaGolmez
    @ElenaGolmez Рік тому

    can you crack one if i send it to you?

    • @ElenaGolmez
      @ElenaGolmez Рік тому

      drive.google.com/file/d/1xp1XN-E9fh1dXnhZCN3NmVHJ6F7R1v8y/view?usp=sharing
      here it is

  • @mokilasto
    @mokilasto 4 місяці тому

    bro this is mlaware

    • @stryker2k2
      @stryker2k2  3 місяці тому +1

      Nope. But, you should treat every executable as if it is malware and always launch it in a network-less virtual machine. So... yes? But no.

    • @mokilasto
      @mokilasto 2 місяці тому

      @@stryker2k2 Ok thank u it works 👍I love your video

  • @ilvichingo1844
    @ilvichingo1844 Рік тому

    hi, can you help me with a difficult program to crack it? pls?

  • @khanra17
    @khanra17 Рік тому +1

    Its Ghidra not Gidra

    • @stryker2k2
      @stryker2k2  10 місяців тому

      lmao! Shhhhh... don't tell anyone.