HackadayU: Reverse Engineering with Ghidra Class 2

Поділитися
Вставка
  • Опубліковано 21 лис 2024

КОМЕНТАРІ • 20

  • @hackaday
    @hackaday  4 роки тому +7

    Hi everyone! I hope that you enjoy the content we put together for these videos.
    If you have questions, feel free to reach out to the Instructor on twitter twitter.com/wrongbaud.
    All of the course details can be found here: hackaday.io/project/172292-introduction-to-reverse-engineering-with-ghidra

  • @suniliyengar8653
    @suniliyengar8653 2 роки тому +7

    This class series is the best I have seen so far. I am so impressed by the clarity of the explanation. This course just made me enjoy learning so much!
    Thank you, you are the best teacher.

  • @Mishanya00
    @Mishanya00 Рік тому +1

    Thanks, you have a very good lesson series of Ghidra

  • @Yocairo
    @Yocairo 3 роки тому +4

    Good course material, thanks!

  • @redpillcommando
    @redpillcommando 4 роки тому +3

    Thank you for this video.

  • @ITOzann
    @ITOzann 4 роки тому +4

    Thank you for the content!

  • @RevUntoMan
    @RevUntoMan 3 роки тому +2

    This course is great! I'm learning a lot!
    Does anyone have a walkthrough for solving /variables-example ?

    • @ahmedadel3301
      @ahmedadel3301 2 роки тому

      If you did it, could you share the solution?!

    • @RussellTeapot
      @RussellTeapot 7 місяців тому

      @@ahmedadel3301 I assume you moved on by now :D but for everyone that's stuck, I cheated a bit: I just wrote a C program that prints the correct characters applying the operations found in the decompiled pseudocode provided by Ghidra. Pay attention to the global variables involved ;)
      I wont disclose anything else tho, good luck :)

  • @baruchben-david4196
    @baruchben-david4196 3 роки тому +2

    Thank you for this clear explanation. I appreciate it.

  • @ivanrubalcava7109
    @ivanrubalcava7109 Рік тому

    Thank you very helpful!👍

  • @kapilk1440
    @kapilk1440 Рік тому

    Any idea about calling convention for Windows userland applications such as IE, Edge, Adobe Reader and Foxit Reader etc? Do they use CDECL, STDCALL or FASTCALL? 🤔

  • @skrmnghrd4520
    @skrmnghrd4520 7 місяців тому

    Hello People! and Matt! I can somewhat get around the ASM code and seeing how it works, but I cannot wrap my head around the passcode on the "variables-example" exercise. I tried RE-ing with the sourcecode and even tried printing the values of the results, but I still do not know what to input in the terminal as the keyword. Anyone have a tip for this?

  • @DemoList-hz8ht
    @DemoList-hz8ht 6 місяців тому

    i dont understand this line 52:53
    64c: lea rcx,rax*4+0x0
    65e: mov DWORD PTR [rcx+rax*1],edx
    why *4+0x0 and *1, can someone explain to me ? thank guys.

  • @TheMateusz535
    @TheMateusz535 2 роки тому

    Hi, could you please provide any clue to loop-example-1? I know it has to be 15 char long, but I have no clue how to satisfy if statement only 8 times in order to to set local_10 to 8.

    • @ahmedadel3301
      @ahmedadel3301 2 роки тому

      check the values at the ascii table

  • @drygordspellweaver8761
    @drygordspellweaver8761 Рік тому

    Why did the global var have different address offsets?

  • @JNET_Reloaded
    @JNET_Reloaded 4 роки тому

    I just uploaded a new linux related vid check out it and let me know what you think please!

  • @doublepositivezero8329
    @doublepositivezero8329 3 роки тому

    I'm sorry, paying to have what competitive edge?

  • @xdonvito
    @xdonvito 3 роки тому

    Death by PowerPoint