Reverse Engineering For Beginners: 1. Reversing a simple Crackme + Cutter

Sdílet
Vložit
  • čas přidán 7. 09. 2024

Komentáře • 26

  • @watchlistsclips3196
    @watchlistsclips3196 Před 3 lety +1

    I am so glad I found your video.Your content is amazing.Thabk thank you for providing us this beautiful content. Please make more videos on reverese engineering

  • @typecasto
    @typecasto Před rokem

    You can right click the `mov eax, 0` line and click `Set immediate base to... > Syscall` and it'll now show the line as `mov eax, read()`.

  • @shmuelsuna5455
    @shmuelsuna5455 Před 4 lety +6

    thank you very much! please make more video's!

  • @temitopehardhekheyhe7359
    @temitopehardhekheyhe7359 Před 3 lety +1

    MORE!!! MAN!!! ... please!! more!!

  • @user-ho5vq1fz1r
    @user-ho5vq1fz1r Před 10 měsíci

    I like everything about the video

  • @bountyhacker6703
    @bountyhacker6703 Před 3 lety +3

    so damn good , more video plz

  • @ThomasSayne
    @ThomasSayne Před 2 lety +1

    Video actually begins at 7:10

  • @martyrd0m
    @martyrd0m Před 3 lety +4

    IMO Cutter is better than Ghidra.

  • @bubblesgrappling736
    @bubblesgrappling736 Před 3 lety +1

    A lot of things are left completely unexplained, should we try to unzip the firle first? should we use the password to open it?

    • @bayo_code
      @bayo_code  Před 2 lety

      You want me to explain to someone trying to learn Reverse Engineering whether to unzip a zip file?

  • @user-kg5jh2ct4r
    @user-kg5jh2ct4r Před 3 lety +2

    How good is cutter compared to Ghidra?

    • @bayo_code
      @bayo_code  Před 3 lety +1

      As far as I know, you get the same functionality as ghidra in cutter, plus cutter even has the ghidra decompiler so that's another great addition... Cutter is based on radare2 cli, so there's pretty much nothing ghidra can do that cutter cannot

    • @user-kg5jh2ct4r
      @user-kg5jh2ct4r Před 3 lety

      @@bayo_code That sounds wonderful. The thing is cutter is currently not able to change function signature like how you can do it in Ghidra

    • @bayo_code
      @bayo_code  Před 3 lety

      @@user-kg5jh2ct4r If you're talking about changing function names, then you can absolutely do it with cutter

    • @user-kg5jh2ct4r
      @user-kg5jh2ct4r Před 3 lety

      @@bayo_code Nope. I'm not talking about changing function names but rather the signature of the functions where during decompilation, Ghidra will generate a main function and because the signature is different, you'll need to change it to make sense of it. For example changing the main to int main(int argc, char **argv)

    • @bayo_code
      @bayo_code  Před 3 lety

      @@user-kg5jh2ct4r Now I get what you're talking about... I'll still check again to make sure cutter doesn't allow changing function signatures, cause I could swear I have used that functionality before... Or maybe it was Ghidra

  • @dvbnews1980
    @dvbnews1980 Před 3 lety

    lmao youre a very funny guy

  • @juliusvalentinas
    @juliusvalentinas Před 2 lety +1

    Change JE to JMP to jump always, what a bad tutorial. I don't even understand assembler but know this.

    • @bayo_code
      @bayo_code  Před 2 lety

      First of all, this is a beginners tutorial. Second, this is reverse engineering.
      You have to do what you have to do to get the program to work as you expect. You're modifying the program to change its usual behavior (in this case, you're trying to bypass the password. Changing assembly to suit your needs is never a bad thing)

  • @mohsenfazzani8770
    @mohsenfazzani8770 Před rokem

    Blabla blabla blabla Prolongation of the topic and dodge speech

  • @PalCan
    @PalCan Před 3 lety +1

    Hey man. Much appreciated bro. This is good info and you're quick and to the point.
    Do you have a discord or a telegram we can follow you at?