x64dbg Demo | CrackMe Challenges

Sdílet
Vložit
  • čas přidán 9. 07. 2024
  • x64dbg is SUPER POWERFUL! ... and super difficult to master! Explore x64dbg with a series of simple executables, DLLs, and some CrackMe Challenges! Also improve your workflow by using x64dbg AND GHIDRA side-by-side!
    Visit the repository at:
    github.com/stryker2k2/dbg-demo
    0:00 Intro
    0:20 Presentation
    5:13 Demo (assem_0x00)
    14:29 Demo (main_0x00)
    18:16 Demo (main_0x01 / hello.dll)
    28:04 Demo (extract DLL)
    32:01 Demo (other examples)
    34:30 Demo (crackme challenge)
    45:44 Conclusion
  • Věda a technologie

Komentáře • 60

  • @berkebicer5140
    @berkebicer5140 Před rokem +4

    master, I gave a huge respect for this. You are best x64dbg teacher ever. I love it thanks for all master

  • @pancakeboy12
    @pancakeboy12 Před 2 lety +4

    Unreal, thanks for sharing. Definitely gonna have a shot at those cracks

  • @chauncey5859
    @chauncey5859 Před rokem +2

    Amazing video!

  • @hadibq
    @hadibq Před rokem +1

    nice suggestion from yt! new sub indeed! Thanks for the great explanation and teaching skills!

  • @LukeAvedon
    @LukeAvedon Před 2 lety +6

    x64dbg with the plugins is so flipping amazing!!! Does not get enough love! I wish I had your skills guys!

    • @Matt-ir1ky
      @Matt-ir1ky Před 2 lety +4

      Look up "Denuvo cracking tutorial" by voksi... He uses x64dbg exclusively and Denuvo is 100% the toughest protection in existence.

    • @LukeAvedon
      @LukeAvedon Před 2 lety +2

      @@Matt-ir1ky I looked up that tutorial! WOW WOW WOW WOW WOW!

    • @ShakilShahadat
      @ShakilShahadat Před 2 lety +1

      Can you suggest some plugins?

  • @drygordspellweaver8761
    @drygordspellweaver8761 Před rokem +4

    This was excellent content. You did many things right like enlarging the UI, showing through example, etc. Thank you for this.

  • @hoangvantruong2942
    @hoangvantruong2942 Před rokem +1

    i really like this video. Thank you so much ^^

  • @zxenon555
    @zxenon555 Před rokem +1

    Hello, I just wanted to thank you for your excellent videos and work, the way that you teach is great, remarking on those little stuff like keyboard shortcuts or menus, that although they may be usual on the daily work with this type of software, for beginners isn't so predictable or intuitive (especially if one doesn't know the vocabulary related to this field) so your way of approaching is great for us. It's a privilege to be able to learn from your work, thank you. Hope my english isn't so broken XD

    • @stryker2k2
      @stryker2k2  Před rokem

      Thanks a ton! I try to keep it as simple as possible! I'm glad you enjoyed it!

    • @tahargermanni6205
      @tahargermanni6205 Před 11 měsíci

      @@stryker2k2 Hello , Please I need your help.

  • @breachbase
    @breachbase Před 7 měsíci +1

    This is super useful, thank you!

  • @speedygonzales1335
    @speedygonzales1335 Před rokem +1

    Great video and work, appreciate your content and style very much - thanks a lot 👍

  • @moazelsawaf2000
    @moazelsawaf2000 Před rokem +1

    Thanks a lot, great start tutorial ❤

    • @stryker2k2
      @stryker2k2  Před rokem

      I'm glad you like it! I just published another one today :)

  • @JohnSmith-he5xg
    @JohnSmith-he5xg Před 2 lety +1

    @42:02 Just a heads up (you might already know this): you needed to change the value of the ZF register (Zero Flag). The "test" instruction sets that. Then the "je" reads the ZF value. So you could have still changed the jump behavior without reloading.
    Good video!

  • @dewmi4403
    @dewmi4403 Před 6 měsíci +3

    Dewmi is back🤩

  • @P-G-77
    @P-G-77 Před rokem +1

    Very good-guy work.

  • @alisadeqi1883
    @alisadeqi1883 Před rokem

    Thank you so much.

  • @rikkoo
    @rikkoo Před 9 měsíci +1

    goated video, thanks

    • @stryker2k2
      @stryker2k2  Před 9 měsíci

      My pleasure! I love making walk-thrus like this :D

  • @MackNNations
    @MackNNations Před rokem +1

    IDA has an option to re-examine/reformat a section as data instead of code so embedded text strings show up easier.
    I'm hoping Ghidra probably has something.

  • @niinuetey9878
    @niinuetey9878 Před 2 měsíci +1

    it will be that you did not have you studio video at the bottom corner of the screen. You can pop it up when there is the need but it is very distracting to really focus

  • @aniketbose4360
    @aniketbose4360 Před rokem

    i want to do source level debugging in x64dbg. i tried searching google but o help. I can debug only with assembly my source file not showing in the source tab

  • @davidez3r098
    @davidez3r098 Před 2 lety +1

    You could also patch the CrackMe0x00 with Ghidra, so the check always evaluate true, and then export the executable to have an executable that always display "Password ok" even if you insert an incorrect one (:
    Anyway good videos!

    • @stryker2k2
      @stryker2k2  Před 2 lety +1

      I love Ghidra! Most of my channel is dedicated to it! And patching executables is by far my favorite thing about it! That and extracting embedded payloads and saving them to disk!

    • @davidez3r098
      @davidez3r098 Před 2 lety

      @@stryker2k2 Yeap, I mean you should do a video on patching too because, if I'm right, I didn't find one with this Ghidra feature. Or maybe there is but I didn't find it xD
      Have a nice coding and day!

  • @_sayroto_
    @_sayroto_ Před 11 měsíci

    when i klick the enter button in the terminator it quits and i don t know why

  • @fred700
    @fred700 Před rokem

    Is there anyone who has tried "debugging" Fractal Software Chaotica? I have tried a while now but don't really manage to do it. Would be really thankfull for hints ;)

  • @aleahmontes8019
    @aleahmontes8019 Před 4 měsíci +1

    where did you write your assembly code at?

    • @stryker2k2
      @stryker2k2  Před 4 měsíci

      You can find my asm code at: github.com/stryker2k2/dbg-demo/blob/master/assem/assem_0x00.asm

  • @anntakamaki1960
    @anntakamaki1960 Před 9 měsíci +1

    6:20
    Hello sir, why do you add 4 to the stack rather than subtract? I thought stack grow towards low memory addresses.

    • @stryker2k2
      @stryker2k2  Před 9 měsíci

      I may have made a mistake in saying that. The main goal was to demonstrate how I use x64dbg; so I appologize if I slipped on some of the particulars.

    • @anntakamaki1960
      @anntakamaki1960 Před 9 měsíci +1

      @@stryker2k2 ok, thanks for clarifying.

  • @samthelamb0718
    @samthelamb0718 Před 3 měsíci +2

    at 1:47 I think you meant to say 32 bit.

    • @stryker2k2
      @stryker2k2  Před 3 měsíci +1

      Wow, yep... you're 100% correct. Good catch!

  • @alisadeqi1883
    @alisadeqi1883 Před rokem

    I have a software that could not crack it. And also could not find solution for it.
    If I send you the software, would you mind creating a tutorial on how to crack it ?

  • @barongello
    @barongello Před 8 měsíci +1

    0x0A is Line Feed, not Carriage Return (which is 0x0D)

    • @stryker2k2
      @stryker2k2  Před 6 měsíci

      Yes, yes it is. Thank you for the correction.

  • @maxsmith2320
    @maxsmith2320 Před rokem

    Nice one.
    My challenge to you crack Vectric Aspire 11.5 ...... I've seen cracked ones but they made it so complicated, so hope with your knowledge and experience you could do a big favor to many of us.

  • @miraclecharacter_
    @miraclecharacter_ Před měsícem

    HOW CAN I TALK TO YOU ?

  • @RenoRivsan
    @RenoRivsan Před 3 měsíci

    Help... I want to reverse engineer a Patch...
    So I have the offsets to edit on HXD provided by the person who made the patch...
    Now how to I find that Offset into x64bg so I can see what string he looked for to patched it.

  • @jeromenowe9331
    @jeromenowe9331 Před 11 měsíci +1

    Weird to hear an human in this video instead of stupid useless and horrible sounds (some call it "music").
    Very good content.

    • @stryker2k2
      @stryker2k2  Před 11 měsíci

      Thanks! I started off in this industry learning from those exact videos and promising myself to make better ones! It's my way of giving back 😊

  • @user-uw8to9dj1c
    @user-uw8to9dj1c Před rokem

    can you crack one if i send it to you?

    • @user-uw8to9dj1c
      @user-uw8to9dj1c Před rokem

      drive.google.com/file/d/1xp1XN-E9fh1dXnhZCN3NmVHJ6F7R1v8y/view?usp=sharing
      here it is

  • @gauravrajak007
    @gauravrajak007 Před 3 měsíci

    Sir, Please crack expert high score 5.0 and PDF 4+ database

  • @mokilasto
    @mokilasto Před 12 dny

    bro this is mlaware

  • @simpleperson3234
    @simpleperson3234 Před rokem +1

    Thank you for your service, Sir. What was your MOS in the military career?

    • @stryker2k2
      @stryker2k2  Před rokem +1

      I did a lot of everything during my military career. Everything from being in a support element, to front lines patrol, parachuting out of airplanes, repelling out of helicopters, and being in places that we 'never were at'. It was an amazing career.

  • @ilvichingo1844
    @ilvichingo1844 Před rokem

    hi, can you help me with a difficult program to crack it? pls?

  • @khanra17
    @khanra17 Před 8 měsíci +1

    Its Ghidra not Gidra

    • @stryker2k2
      @stryker2k2  Před 6 měsíci

      lmao! Shhhhh... don't tell anyone.