Reverse-Engineering - How Do Hackers Debug & Hack System Software/Services (2023)

Поделиться
HTML-код
  • Опубликовано: 29 дек 2024

Комментарии • 8

  • @xenjin450
    @xenjin450  Год назад

    Video Timeline:
    Introduction 1: Assembly-Registers: 00:00
    Introduction 2: Memory-Architecture: 07:53
    Introduction 3: Machine-Code/Binary Data Segments: 12:47
    Introduction 4: Stack & Heap Memory: 17:16
    Tools/Programm Used For Reverse-Engineering Windows/Mac OSX/Linux: 22:15
    Practical 1: Tool Functions & Modifying "Hello" Code Binary To Display As Hellx String: 23:58
    Practical 2: Attach & Detach Processes And Dynamic Analysis of Binaries:
    33:28
    Practical 3: Cracking Game Softwares: 36:27
    Practical 4 Debugger-Breakpoints: 40:25

  • @saddambukhari75
    @saddambukhari75 Год назад +2

    you are all time genius

  • @saddambukhari75
    @saddambukhari75 Год назад +1

    great

  • @LuxAeternaCoub
    @LuxAeternaCoub Год назад

    nice bro

  • @xenjin450
    @xenjin450  Год назад

    Assembly Cheat-Sheet:cs.brown.edu/courses/cs033/docs/guides/x64_cheatsheet.pdf
    Learn & Understand Assembly: www.tutorialspoint.com/assembly_programming/assembly_quick_guide.htm
    Convert & Deconvert Assembly To Hex Or Vice-Versa:defuse.ca/online-x86-assembler.htm

  • @xenjin450
    @xenjin450  Год назад

    Reverse-Engineering Tools:
    Ghidra:ghidra-sre.org/ // Mac OSX/Windows/Linux
    (Best for Static Analysis And Converting Assembly-code to C/C++)
    IDA:hex-rays.com/ida-pro/ // works on Mac OSX/Windows/Linux
    (Static & Dynamic Analysis)
    x64DBG:x64dbg.com // Windows
    (Static & Dynamic Analysis)
    GDB:www.onlinegdb.com/ // Linux/Mac OSX/Windows/iOS/Android
    (Terminal-Based Static & Dynamic Analysis)
    radare2:formulae.brew.sh/formula/radare2 // Mac OSX/Windows/Linux
    (Recommened for Mac OSX)
    github.com/frida/frida // Windows/Linux/Mac OSX/iOS/Android
    (Best For iOS/iPad/Apple Watch/....Apple Systems)