Reversing WannaCry Part 1 - Finding the killswitch and unpacking the malware in

Поделиться
HTML-код
  • Опубликовано: 12 янв 2025

Комментарии • 844

  • @_a_x_s_
    @_a_x_s_ 5 лет назад +1630

    Reverse engineering enhances the understanding of both programming thought and skills. This video is easy to follow, and the main techniques of reverse engineering are shown clearly, which makes me want to decompile a small interesting program to analyze it.

    • @wanderingpalace
      @wanderingpalace 5 лет назад +14

      安笑生 yeah we can learn programming from reverse engineering stuffs
      你好同志

    • @r0x304
      @r0x304 4 года назад +3

      lol

    • @ADeeSHUPA
      @ADeeSHUPA 2 года назад

      @@wanderingpalace 安笑生

    • @gameacc6079
      @gameacc6079 Год назад

      @@wanderingpalace i love xi jinping's huge cawk

    • @muth69
      @muth69 Год назад

      @@wanderingpalace no you absolutely can't

  • @lynx5327
    @lynx5327 5 лет назад +3774

    I'm a vegetable that doesn't understand anything but this was an interesting video

    • @GamerTheTurtle
      @GamerTheTurtle 5 лет назад +34

      @@ayylmaoglow
      takes one to know one! unless you're a reptilian

    • @ThisDaveAndThatJohn
      @ThisDaveAndThatJohn 5 лет назад +55

      read the book Code by Charles Petzold. You will understand how the CPU and assembler works even if you are a total noob. After that you will automatically understand how programming languages work, reverse engineering too and so on.

    • @ThisDaveAndThatJohn
      @ThisDaveAndThatJohn 5 лет назад +3

      @Rajath Pai trust me. Petzold is a guru

    • @zxxczczczcz
      @zxxczczczcz 5 лет назад +2

      @@ThisDaveAndThatJohn code by charles petzold?

    • @HimanshuPal-li7nj
      @HimanshuPal-li7nj 5 лет назад +4

      Ok BOOMER

  • @l2ubio
    @l2ubio 5 лет назад +359

    "Microsoft security center (2.0) sevice" LMAO

  • @SouravTechLabs
    @SouravTechLabs 5 лет назад +2122

    Looks like Ghidra is a very good renaming tool!

    • @vladysmaximov6156
      @vladysmaximov6156 5 лет назад +16

      I prefer ollydbg 2.01 or x64dbg for 64 bit, ghidra makes really easy the reverse process, can get a source code... I prefer analyze asm instructions one by one for understand fully process but this isn't the best stategy.. one by one can take you a lot of time i use call stack window for locate specific part i want to analyze!

    • @aasquared8191
      @aasquared8191 5 лет назад +46

      @@vladysmaximov6156 keep us posted mate

    • @Luzum
      @Luzum 4 года назад +89

      @@vladysmaximov6156 weird flex but ok

    • @madghostek3026
      @madghostek3026 4 года назад +22

      @@vladysmaximov6156 I tried out ghidra and improved my performance like 10 times (mainly due to being shit in reading asm fast).

    • @jonarmani8654
      @jonarmani8654 4 года назад +10

      @@vladysmaximov6156 You absolute pleb. Version 1.10 or GTFO.

  • @_nit
    @_nit 5 лет назад +168

    Wow that was probably one of the best descriptive reverse engineering videos I've seen to date. Your method of explaining and showcasing each step in each function is fantastic and even explaining how to identify when disassemblers/decompilers mess up and how to fix them.
    Bravo. I'm upset that I waited this long to actually start watching these videos.

    • @vasilysu
      @vasilysu 6 месяцев назад

      Fully agree, amazing video! Simple step by step explanation is excellent!

  • @tomasviane3844
    @tomasviane3844 5 лет назад +20

    I didn't understand anything of what you did, but the casualness of explaining something so exoticly complicated drew me in.

  • @_ahmedkira
    @_ahmedkira 5 лет назад +121

    Ghidra ninja:The function is very simple
    Me:

  • @MrMasterRhythm
    @MrMasterRhythm 5 лет назад +537

    Love this! Please create a series of Reverse Engineering Basics!

    • @oliviasmith4680
      @oliviasmith4680 5 лет назад +2

      Yes

    • @MattZelda
      @MattZelda 5 лет назад +16

      Just gotta learn GDB, Radare, OllyDBG for Windows, and assembly. And even then the assembly is the part that while takes the longest isn't too bad once you get used to it.

    • @MattZelda
      @MattZelda 5 лет назад +5

      Oh and IDA / Binary Ninja are good too.

  • @TheDankTiel
    @TheDankTiel 5 лет назад +149

    I understood everything except for the renaming parts. Meaning i did not understand a thing. Cool vid tho, you've earned a sub!

  • @dd12332
    @dd12332 5 лет назад +1767

    You know too many things. You explain it too casually like it's food lmao.
    This guy be like:
    Ok, let me present you my house.

    • @lionkor98
      @lionkor98 5 лет назад +19

      hijacking this to say WE NEED PART 2

    • @User-ko3un
      @User-ko3un 5 лет назад +7

      Inserts his too powerful(smart) to be kept alive meme*

    • @acc373r4t0r
      @acc373r4t0r 4 года назад +2

      looks pretty standard to me

    • @NanoValorant
      @NanoValorant 4 года назад +18

      Plot twist: he is the hacker who made wanna cry

    • @brunph6174
      @brunph6174 4 года назад +2

      marv b first 20 minutes is really basic stuff. Its just general reversing and assigning names

  • @ThoughtinFlight
    @ThoughtinFlight 5 лет назад +38

    This was SUPER interesting and well made, please continue! You left us on a cliffhanger!

  • @sebastienducasse934
    @sebastienducasse934 5 лет назад +9

    Very interesting and complete video, first time I watch a reversing engineering video and I love the way you investigate and explain what you do. It's the first video of your channel I see and I love it. Keep going !

  • @georgedomse
    @georgedomse 5 лет назад +19

    Just wow. Impressive job! I hope you are employed by one of the major tech/AV companies.

  • @funnypallu
    @funnypallu 5 лет назад +5

    I am just happy that there are people out there who understand stuff like this! 😅

  • @xoxo-sf1zg
    @xoxo-sf1zg 5 лет назад +25

    First time RUclips recommended me something amazing. 😀

  • @rubenco1253
    @rubenco1253 5 лет назад +13

    I am currently doing my bachelor in Computer Science and didn't know this reverse engineering even existed!
    Very cool and very nicely explained. Showing the keyboard output is also a nice addition of you! Thanks :)

    • @elijahburnham7882
      @elijahburnham7882 4 года назад

      RubenCO what language is this in?

    • @Slenderman63323
      @Slenderman63323 Год назад +3

      @@elijahburnham7882 The left side of Ghidra is x86 Assembly and the right side is C.

    • @hjrgf
      @hjrgf 11 месяцев назад

      ​@@Slenderman63323you need low level knowledge to be able to do stuff like this since the c code that is outputed is very low level

  • @BekircanDAL
    @BekircanDAL 5 лет назад +38

    Subbed instantly.Cant wait for another episodes.

  • @BernhardMillauer
    @BernhardMillauer 5 лет назад +26

    That was very insightful! I'm a software developer/architect for 17 years now and I must say that you have a very nice way to tell details and to guide your audience. thank you very much!
    for the follow up video I would like to see the "physical" impact of the malware, like show the registry-key or the installation folder to make it more understandable for non-developers.

    • @not_glad
      @not_glad 10 месяцев назад

      I have a few questions. I've done vb coding for years, but more as a supplement to my other work loads, I'm not a full blown dev.
      First, what was so hard about spotting the kill switch? There must have been a lot of the best devs looking at this code globally for 4 days, the guy who killed it even did that on accident.
      Secondly, and I'm not advocating for better viruses, but would a kill switch that the owner had exclusive controle over not be possible? They went to great lengths coding this but left the kill switch free for anyone to use.

  • @THExBOSSxKSA
    @THExBOSSxKSA 5 лет назад +3

    I'm so happy that RUclips recommended this video to me. Keep up the good work! Waiting for part 2..

    • @stacksmashing
      @stacksmashing  5 лет назад +2

      Hopefully tomorrow :) life has been busy

  • @xmesaj2
    @xmesaj2 5 лет назад +2

    I don't really know what's going on because Im noob but these videos are cool, this is the best and practical approach I've seen I think, loving it and subbed immadietely, good commentary, step by step. Waiting for more.

  • @saeedmahmoodi7211
    @saeedmahmoodi7211 5 лет назад +2

    first time i watched this about 2 year ago and i was a simple java programer
    now i am a c/c++ programming working at a hardware developing company and i just watched this again
    that was awesome , i finally understood what was u talking about , i am always checking u tube for part 2 please upload it i am tried :)

  • @anuragC819
    @anuragC819 5 лет назад +3

    RUclips algo has done it again. Could understand probably 1% of what was talked about, but it seemed very interesting. Subscribed!

  • @jed833
    @jed833 5 лет назад +4

    Fantastic Video, I hope to see more both on wannacry and other things soon. As an embedded SW guy looking to get into RE this was great.

  • @sanderspeetjens
    @sanderspeetjens 5 лет назад +10

    Looks good want to see the following episode. Reverse engineering seems pretty fun.

  • @saadeddhaher1706
    @saadeddhaher1706 4 года назад +240

    everyone: try not downloading files from entrusted places!!!
    Ghidra: let's unpack the malware !

    • @naxzed_it
      @naxzed_it 4 года назад

      @starshipeleven He could use a VM.

    • @brunoeilhart8516
      @brunoeilhart8516 4 года назад +1

      What is an entrusted place?

    • @fatfr0g570
      @fatfr0g570 4 года назад +6

      starshipeleven presumably you download the sample from within the VM, then disable the Ethernet adapter that gives the VM Internet access to prevent worms from going through the connection.

    • @fatfr0g570
      @fatfr0g570 4 года назад

      starshipeleven forgot about that option, thanks for reminding me.

    • @yaelm631
      @yaelm631 4 года назад +1

      Just something that scares me :
      They are easy accessible websites to download loads of virus to try antivirus and understanding how they work ?
      I hope they tell the user several warnings before sending the file

  • @CorporateSeltzer
    @CorporateSeltzer 5 лет назад

    I came across your channel shortly after downloading Ghidra. I appreciate how you clearly detail your train of thought in each video. I hope to see more!

  • @osamazaid25
    @osamazaid25 5 лет назад +10

    Wow this is very impressive! Great job & keep going :)

  • @i-use-arch-btw3954
    @i-use-arch-btw3954 5 лет назад +534

    WannaCry: exists
    Ghidra: im about to end this mans whole carrer

    • @xyphoes345
      @xyphoes345 5 лет назад +8

      what the H E C C is a carrer

    • @glowingone1774
      @glowingone1774 5 лет назад +1

      @@xyphoes345 it's a carrer

    • @xyphoes345
      @xyphoes345 5 лет назад +3

      @@glowingone1774 isnt it meant to be a *career* tho

    • @glowingone1774
      @glowingone1774 5 лет назад +4

      @@xyphoes345 no this is much different.

    • @quaintfalopa9724
      @quaintfalopa9724 5 лет назад +1

      but wannacry isnt a man

  • @blancomation554
    @blancomation554 5 лет назад +39

    subbed, 22 minutes passed like a breeze

  • @bence0302bence
    @bence0302bence 5 лет назад +11

    Abra, Kadabra, Alakazam,
    You now possess a new subscriber,
    Simsalabam.

  • @WindBringsMemories
    @WindBringsMemories 5 лет назад +11

    Nice tutorials man! Maybe some basics for reverse engineering video's in Ghidra would be great as well! Like explaining how the system works and what each action truly means :). But it's great :) Can't wait for the next one.

  • @xXWipeout4Xx
    @xXWipeout4Xx 5 лет назад +9

    Interesting and good video. Reverse engineering and programming isn't really my thing and a lot of it is going over my head. But it's an interesting and informative video none the less. Waiting to see part 2!

  • @tcocaine
    @tcocaine 5 лет назад +27

    Really well done video. I think you should keep this series in this format. Personally I like the pacing of the video, and wouldn't want it slower, or faster.

  • @oleksiit2156
    @oleksiit2156 5 лет назад +1

    Best video i ever seen on reverse engineering, keep it easy to understand! Thank you.

  • @kripposoft
    @kripposoft 5 лет назад +1

    This was super interesting. Please continue with this series

  • @PASTRAMIKick
    @PASTRAMIKick 5 лет назад +6

    I used the GNU debugger to reverse engineer some stuff, but with more complex programs it gets harder, this seems make things more agile and clear

    • @bancodrut
      @bancodrut 5 лет назад +1

      Might be just Ghidra making it seem too easy 😃

  • @Elffi
    @Elffi 5 лет назад +168

    Ghidra: *does windows reverse engineering in iOS*
    Windows: "Am I a joke to you?"

    • @rohitas2050
      @rohitas2050 5 лет назад +55

      macOS*

    • @Elffi
      @Elffi 5 лет назад +6

      @@rohitas2050 woops

    • @Juppie902
      @Juppie902 4 года назад +1

      more like Reclass: Am I a Joke to you ?

    • @smwfreak1647
      @smwfreak1647 4 года назад

      @@Elffi LOL

  • @i3130002
    @i3130002 5 лет назад +3

    Man, I used to debug exe using ollydebug and you are taking it to another level 🤯

  • @dawnv3436
    @dawnv3436 5 лет назад

    Ghidra looks like an EXCELLENT tool to manage an RE session. Top notch.

  • @BGroothedde
    @BGroothedde 5 лет назад +11

    Amazing video, very good to follow and it helped me a lot with some frustrating 'features' in Ghidra. I found I was using the disassembler window more than the decompilation window because of weird decompilation results - you helped me understand getting better decompilation results by adjusting Ghidra's interpretation of some code.
    Thanks!

    • @stacksmashing
      @stacksmashing  5 лет назад +4

      That's awesome to hear, thank you! Feel free to let me know what else you have trouble with, maybe it's something I can feature in the future

    • @BGroothedde
      @BGroothedde 5 лет назад

      @@stacksmashing I'll be sure to comment it when I find more stuff, but seeing you work already solves a lot of problems!

    • @manuellopes1269
      @manuellopes1269 5 лет назад

      @@stacksmashing greaat tut, can please explain if possible im chrome devtools save the changes i make in offline? i want change a pwa web worker app that works online and offline but the changes i made nolt save when i restart the app, exist any trick to save?if i not save i only get the cache of pwa app and not possible open and edit i think, thanks

  • @drakibble2199
    @drakibble2199 5 лет назад +1

    Hey, I love watching reverse engineering videos! Thank you for this one. I'm glad that the RUclips recommendation bots have blessed you.

  • @Defyyyy1
    @Defyyyy1 5 лет назад +3

    Keep up the amazing work you do with your videos!

  • @aibh7903
    @aibh7903 5 лет назад +1

    I’m trying to learn Ghidra and reverse engineering in general, and this and your other videos are so helpful.

  • @bluenightsky
    @bluenightsky 4 года назад +2

    I have no idea what's gong on here, but I'm straining to understand. Great video!

  • @Yz0x
    @Yz0x 4 года назад +2

    Your skills are unbelievable. Good job 👏🏼

  • @andrasfogarasi5014
    @andrasfogarasi5014 5 лет назад +182

    Reading the WannaCry warning, the creaters were real lads, providing multiple languages, information about BitCoin and a contact method.
    They just sound incredibly kind.

    • @gabe6278
      @gabe6278 5 лет назад +61

      tbh, i think they knew that they would affect millions of devices. humble people

    • @SteppingStonevlogs
      @SteppingStonevlogs 4 года назад +51

      Kind, maybe not, but they were reasonable. Do as we ask and we promise all will be well. And see we have written in clear language what we want you to understand. Give us the money and have a nice day 😊

    • @kahlzun
      @kahlzun Год назад +63

      professionals have *standards*

    • @hiddenaether
      @hiddenaether Год назад +56

      cant get money from someone who cant understand what they are reading

    • @ryannorthup3148
      @ryannorthup3148 Год назад +1

      @@kahlzun Investigations show that this was most likely an attack by the North-Korean Government-Controlled Lazarus hacking group to fund nuclear programs and Fatass Jong Un's Sanction-Bypassing Goldschlager run. Eh, probably not Goldschlager. The fatass is probably going for something more expensive.

  • @yegnasivasai
    @yegnasivasai 5 лет назад +1

    I didn't understand single bit of information u said but I watched full video..and subscribed.. Thanks for making this video

  • @LookeyPL
    @LookeyPL 5 лет назад +1

    Very informative and interesting video. Thanks for that amazing upload! I cannot wait to see its continuation.

  • @SullySadface
    @SullySadface 3 года назад

    I don't know shit about coding, but you've explained this in a very human-readable way and i appreciate that.

  • @MrCollyTV
    @MrCollyTV 5 лет назад +1

    Thanks for the great work! Can't wait for a part 2

  • @Chillieman
    @Chillieman Год назад

    Dude!! This is an epic walkthrough of reverse engineering - SO INTERESTING!!

  • @weaver3636
    @weaver3636 5 лет назад +7

    I honestly didn't understand a single thing but I still appreciate the video, so thanks for sharing this.
    I wonder who was behind the attack. It pisses me off there was nothing I could do to help when it happened to my relatives.

    • @fatfr0g570
      @fatfr0g570 4 года назад

      It might be finger pointing, but the US, UK, and Australia claimed that North Korea was behind the attack.

    • @hiddenaether
      @hiddenaether Год назад

      @@fatfr0g570 they formally asserted its origin as North Korea, the only 2 instruction pages not machine translated were english and chinese. more interestingly, the developers computers had Korean font families installed and build stamps indicated their timezone.

  • @Kaplan0644
    @Kaplan0644 5 лет назад +6

    Very nice video, thank you. I would definitely want to see more malware analysis with ghidra videos. :)

  • @samyuj
    @samyuj 5 лет назад +1

    Thanks man! Great content!! Definitely looking forward to more!!
    All the best!!

  • @221Gregor
    @221Gregor 5 лет назад +1

    Again your videos are insanely good !!! Love it !

  • @khatharrmalkavian3306
    @khatharrmalkavian3306 3 года назад +1

    I wouldn't mind doing that for a living. It seems like the sweet spot between meditative focus, puzzle solving, and education.

    • @Slenderman63323
      @Slenderman63323 Год назад +1

      Trust me, it gets old fast.

    • @hiddenaether
      @hiddenaether Год назад +1

      @@Slenderman63323 Nahh, things are constantly changing which keeps it interesting. Unless you dont know what youre doing or looking at then yeah, I could see it getting "old fast"

  • @Frankie_Freedom
    @Frankie_Freedom 5 лет назад +3

    Wow... as difficult as all this sounds, I'm a new security enthusiast, so I'm still learning. I was able to understand and somewhat follow what you were doing. kudus.

  • @kinershah464
    @kinershah464 Год назад +1

    Very good video. Thanks for this video. That flowchart was helpful too. I have never seen reverse engineering in practice, this was very interesting. Very similar to debugging programs only here we don't have symbol information and have to create our own symbols, but it seems this Ghidhra tool makes things a lot convenient.
    Whoever wrote this malware must have very good knowledge of Windows API, maybe even about Windows kernel.

  • @awabomer
    @awabomer 5 лет назад +3

    So fast and accurate like a real ninja 😂, nice video , I didn't have to use speed 2 , like I usually do 😂

  • @mend444
    @mend444 5 лет назад +3

    Impressed by your work. Keep it up! :D

  • @muzammilbutt20
    @muzammilbutt20 5 лет назад +2

    Would love to see a tutorial on TP-Link router firmware RE or firmware with similar architecture, reverse engineering and rebuild of the firmware. Love your videos so far.

  • @Pyritenite
    @Pyritenite 5 лет назад +6

    Well, I dont really understand well but Im here to understand it better, thanks for the video!
    Edit: i actually managed to understand a part of it

  • @TheMadMagician87
    @TheMadMagician87 5 лет назад

    Thanks for your videos, great detail. I hope you carry on with this channel and it's content.

  • @CrovaxHD
    @CrovaxHD 4 года назад

    i'm ignorant as a goat about this, but i find this voice quite relaxing and soothing

  • @prerunning6086
    @prerunning6086 5 лет назад +2

    Awesome video looking fwd to part 2

  • @damienw4958
    @damienw4958 5 лет назад

    Wow, I learnt so much about decompilation in this video! Thanks, keep it up!

  • @nasserghoseiri4934
    @nasserghoseiri4934 5 лет назад +1

    This is some quality work! Congrats...

  • @better-break-bad-edits
    @better-break-bad-edits 3 года назад +1

    Parents: Install obvious virus that slows down the computer.
    Parents: It must be that Steam thing.

  • @echdareez
    @echdareez 5 лет назад

    Highly informative! Clearly explained, only understood about half of it but subscribed!!!

  • @RonShaders
    @RonShaders Год назад

    i don't know much about what you are doing but you earn a new subscriber here

  • @voDKaandEric
    @voDKaandEric 4 года назад

    you make me realise how little I know about anything. Great video

  • @anonpy6638
    @anonpy6638 Год назад

    Si entendiera inglés y lo que haces me encantaría seguir lo que haces. Mis ojos se quedaron atrapados cuando vi este video al parecer lo había visto antes y no comenté. .Mis respetos hombre.

  • @ImXyper
    @ImXyper 4 года назад +35

    imagine doing this and accidentally running wannacry. i would actually scream

    • @watema3381
      @watema3381 4 года назад +16

      **laughs in multiple VMs running in Arch Linux**
      i use arch btw

    • @bigbythebigbadwolf
      @bigbythebigbadwolf 3 года назад +8

      @@watema3381 no one cares

    • @watema3381
      @watema3381 3 года назад +7

      @@bigbythebigbadwolf aparently you do cause you replied!
      also (incase you haven't noticed), it's an inside joke

    • @bigbythebigbadwolf
      @bigbythebigbadwolf 3 года назад +12

      @@watema3381 still no one cares

    • @bigbythebigbadwolf
      @bigbythebigbadwolf 3 года назад +1

      @@medo7dody ur prob crying behind ur screen: i dont care either but i gotta be an edgy loser so i can prove this guy wrong

  • @Yumikitsu
    @Yumikitsu 5 лет назад +1

    I didn't understand anything, but I would have loved to cause it seems like a very useful skill to have and props to you for being so good at it!

  • @ihabmb8960
    @ihabmb8960 5 лет назад +1

    Great video. Waiting for the next part

  • @powerfrog3688
    @powerfrog3688 5 лет назад

    I almost fell asleep watching this video just because of this guy's beautiful asmr voice

  • @YLCao
    @YLCao Год назад

    Great video! Looking forward to more of your videos on Ghidra reverse engineering!

  • @NicoTheCinderace
    @NicoTheCinderace 5 лет назад +51

    "This is part 1"
    *months later*

  • @snowcold903
    @snowcold903 5 лет назад +3

    This is very interessting! Can't wait for part 2. Have discovered these malwares before, but fortunately it was on a computer with no important stuff on it. One question, are you really using mac osx or is this linux with mac os x skin ??

    • @drozcan
      @drozcan 5 лет назад

      Nope this is macOS

    • @muff1n1634
      @muff1n1634 5 лет назад

      it's macOS 2: electric boogaloo (system-wide dark theme included)
      get your copy today and save 50% off the normal cost!

  • @TriggerBiggs
    @TriggerBiggs 5 лет назад

    great work....can´t wait for part II

  • @sodicious
    @sodicious Год назад +3

    i dont know what you are saying but i think this is very great

  • @youtube_bat3811
    @youtube_bat3811 Год назад

    this is the video that helped me learn how to reverse engineer, thank you

  • @Miodex69
    @Miodex69 5 лет назад +2

    Keep doing this. Show the world sth more about WannaCry.

  • @Marco_Ris
    @Marco_Ris 5 лет назад

    Verstehe erst noch Bahnhof, aber ist ein interessanter Kanal. Weiter so!

  • @nezu_cc
    @nezu_cc 5 лет назад +1

    Awesome work as always. Keep it up

  • @rj-nj3uk
    @rj-nj3uk 5 лет назад

    I love your videos. It inspired me to chose computer security for my career. Give me a heart.

  • @vengefulgod_
    @vengefulgod_ 4 года назад +1

    Great work and love what you did to show us how to reengineer a malware program like wanna cry I am in discord and on htb trying everything I can do to learn this so thank you and this is very helpful

  • @jeromecabarus6893
    @jeromecabarus6893 5 лет назад +2

    you have finally cracked the 'WannaCry'' virus! I'm Impressed

  • @aerglass9816
    @aerglass9816 2 года назад +1

    this is the only guy who can decrypt wannacry without paying it lol

  • @recklessroges
    @recklessroges 5 лет назад +3

    I am looking forward to the next video. (Should you encrypt the copy of Wannacry on your website using the AES key in your previous video? That would protect script kiddies from themselves and create a nice easter egg/crackme challenge?)

  • @Zayetzo
    @Zayetzo Год назад

    Reminds me when I reverse engineered a program that communicated with certain peripherals to try to understand how that obscure peripheral worked. No information online except for the program itself at hand.

  • @night2night3
    @night2night3 5 лет назад +6

    The video is excellent, I understood most of it with some rudimentary background in programming. I would suggest that after you finish uploading all the videos running through the code, that you upload a 5-10 minute video with just a recap of what you learned and maybe a description of the overall workflow and your thoughts. I think that one would be a lot better for the rest of the 95% of watchers.

  • @testplmnb
    @testplmnb 5 лет назад +33

    i wonder if wannacry author watched it :D

    • @jayzah
      @jayzah 4 года назад +1

      Nsa? Of course

    • @Falaxuper
      @Falaxuper 3 года назад +1

      @@jayzah It was made by North Korean cybercrime organization codenamed 'Lazarus'

    • @lowrhyan567
      @lowrhyan567 3 года назад

      It probally have more than 1 author

  • @elliotmason681
    @elliotmason681 5 лет назад +9

    Thank you for your videos!!

  • @lilrich1243
    @lilrich1243 5 лет назад +1

    Thanks to solo learn the C++ and the python course I understand the basic functions. I just need to finish the modules for both and I'll be able to understand this a lot better

  • @Drakestophet
    @Drakestophet 4 года назад

    The creators of WannaCry must have been geniuses like this guy

  • @chrisrider963
    @chrisrider963 5 лет назад +2

    Great video! Thank you! When will part 2 be released?

  • @Jell0zz
    @Jell0zz 5 лет назад +1

    This looks very interesting, great analysis, even for laymen.

  • @VoKuHiLaMan
    @VoKuHiLaMan 5 лет назад +1

    awesome video! I'd love to see more!

  • @eyalcohen2622
    @eyalcohen2622 Год назад

    Was looking for a video like this, thank you 👍