HackadayU: Reverse Engineering with Ghidra Class 2

Sdílet
Vložit
  • čas přidán 7. 09. 2024

Komentáře • 20

  • @hackaday
    @hackaday  Před 4 lety +7

    Hi everyone! I hope that you enjoy the content we put together for these videos.
    If you have questions, feel free to reach out to the Instructor on twitter twitter.com/wrongbaud.
    All of the course details can be found here: hackaday.io/project/172292-introduction-to-reverse-engineering-with-ghidra

  • @suniliyengar8653
    @suniliyengar8653 Před 2 lety +6

    This class series is the best I have seen so far. I am so impressed by the clarity of the explanation. This course just made me enjoy learning so much!
    Thank you, you are the best teacher.

  • @Mishanya00
    @Mishanya00 Před 10 měsíci +1

    Thanks, you have a very good lesson series of Ghidra

  • @ITOzann
    @ITOzann Před 4 lety +4

    Thank you for the content!

  • @Yocairo
    @Yocairo Před 3 lety +4

    Good course material, thanks!

  • @redpillcommando
    @redpillcommando Před 4 lety +3

    Thank you for this video.

  • @baruchben-david4196
    @baruchben-david4196 Před 3 lety +2

    Thank you for this clear explanation. I appreciate it.

  • @DemoList-hz8ht
    @DemoList-hz8ht Před 3 měsíci

    i dont understand this line 52:53
    64c: lea rcx,rax*4+0x0
    65e: mov DWORD PTR [rcx+rax*1],edx
    why *4+0x0 and *1, can someone explain to me ? thank guys.

  • @RevUntoMan
    @RevUntoMan Před 3 lety +2

    This course is great! I'm learning a lot!
    Does anyone have a walkthrough for solving /variables-example ?

    • @ahmedadel3301
      @ahmedadel3301 Před 2 lety

      If you did it, could you share the solution?!

    • @RussellTeapot
      @RussellTeapot Před 5 měsíci

      @@ahmedadel3301 I assume you moved on by now :D but for everyone that's stuck, I cheated a bit: I just wrote a C program that prints the correct characters applying the operations found in the decompiled pseudocode provided by Ghidra. Pay attention to the global variables involved ;)
      I wont disclose anything else tho, good luck :)

  • @ivanrubalcava7109
    @ivanrubalcava7109 Před rokem

    Thank you very helpful!👍

  • @skrmnghrd4520
    @skrmnghrd4520 Před 5 měsíci

    Hello People! and Matt! I can somewhat get around the ASM code and seeing how it works, but I cannot wrap my head around the passcode on the "variables-example" exercise. I tried RE-ing with the sourcecode and even tried printing the values of the results, but I still do not know what to input in the terminal as the keyword. Anyone have a tip for this?

  • @kapilk1440
    @kapilk1440 Před rokem

    Any idea about calling convention for Windows userland applications such as IE, Edge, Adobe Reader and Foxit Reader etc? Do they use CDECL, STDCALL or FASTCALL? 🤔

  • @TheMateusz535
    @TheMateusz535 Před 2 lety

    Hi, could you please provide any clue to loop-example-1? I know it has to be 15 char long, but I have no clue how to satisfy if statement only 8 times in order to to set local_10 to 8.

  • @drygordspellweaver8761

    Why did the global var have different address offsets?

  • @JNET_Reloaded
    @JNET_Reloaded Před 4 lety

    I just uploaded a new linux related vid check out it and let me know what you think please!

  • @doublepositivezero8329

    I'm sorry, paying to have what competitive edge?

  • @xdonvito
    @xdonvito Před 2 lety

    Death by PowerPoint