thank you for all these vids, they helped me with the basics of reverse engineering. I'm currently working on reverse engineering a ps3 game and it's been incredibly fun so far
For anyone here new to Python, if __ name __ == "__main__": main() prevents the main function from running when you import the file/script somewhere else. If you call a function after defining it without this check, it will run even if the file is imported, which you usually don't want Edit: had to insert spaces between the underscores and name because YT thought I wanted it italic. In actual code, it would be 2 underscores, name, 2 underscores (no spaces between); sometimes read as "dunder name" (concatenating/abbreviating "double underscore" to "dunder")
8:40 I am not a fan when people make negative comments about someone's use of a tool to complete a task. Programming doesn't need more elitism or stupid battles.
I read your comment before watching that part and I totally got the wrong idea lol Thought you meant that no-code "hackers" should not be looked down upon. To which I disagree. But by "tool" you were referring to the choice of language, to which I agree, hacking is a mess either way, the choice of language should not matter as long as it does the job.
Thats how you know he is a _real manly_ C/C++ programmer, he apologies for using Python, and as a fellow C/C++ programmer I forgive you. Jokes aside, good video!!!
The decompilation target language doesn't matter. If you can compile source code to *native* bytecode, you can reverse it if you know the bytecode's target ISA (e.g. x86, x86_64, AMD64, various versions of ARM, et cetera). Some bytecode is *not* natively compiled such as WASM, CIL, and Java bytecode. C is preferable for decompilation because it normally has very little abstraction and is *almost* 1:1 with assembly language. C runtimes or compilers usually inject boilerplate for setup of heap memory management.
What keyboard are you using? I like that it's not a crappy loud mechanical keyboard, that even your neighbours could hear through three walls. Is it the same in your current videos?
Why - just speculating here, because cpp streams are weird. How - he has emulated the result of the text input himself, he put the string pointer on the stack (this is exactly what that cpp function does after fetching the text), and he has skipped the stdin function.
14:37 - Hold up. Where did these magic hex numbers come from? Why those offsets? Can they be determined in a cleaner way, rather than hard coded like that?
I love your merch, I have the mousepad and the t-shirt, do you have any other plans for more reverse engineering or low level related merch? I would totally buy more
Now crackmes are cool but whos gonna actually have good info on compiling osx/xnu kernel, modifying kernel/writing a kernel driver to disable debugging detection, bypass address randomization. What for? Oh yeah, just to bypass debug detection and also have a way to dump consistent traces. And just to begin on actually getting progress with 20mb+ binaries
Great video, I'm new to this stuff. couple of doubts, when giving the address of the good and avoid case, why is only 4byte address is provided instead of entire address from memory map? secondly, how the hell do you learn all there stuff? since there are multiple libraries/tools.concepts used just for one problem. Impressive btw!
When running with correct permissions you can choose to disable ASLR for a spawned process which is likely what angr does. GDB uses the "personality" syscall to do this with the flag ADDR_NO_RANDOMIZE.
Can you make a video on how this would work when an application also has a DLL etc? ive tried this once on an application with a DLL and it got very confusing, really couldnt figure any of it out.
Hey , very nice intro to angr, i have a bit that i didn’t get is why the first try with the 32.8 bit key space reached in the simulator the last address ? That for me doesn’t yet click
@@atijohn8135 The thing is, binary instructions follow the intel syntax. So, especially for those who create compilers, the AT&T syntax is confusing, even tho it makes more sense...
When machines take over us, I hope you speak for us all as you know their native language. Interesting to watch, don't hava a clue about how anyone can learn those skills... :D
There's a piece of abandoned niche commercial software which I'd love to crack for archival purposes. Will this work on it? It's written in Delphi and it can be activated offline even though there was an internet activation option (which obviously doesn't work anymore). There is version 3.x which is still being sold even though there were no updates for 8 years or any activity from the dev whatsoever. Thing is, version 3.x is a joke. Well, 2.x was an actual joke, not worth a penny, and 1.x is the legendary version which I'd like to crack. I believe it would still be used today if the dev released a 64bit version like he promised :( The released version crashes way too often because of the ram limitation.
Meh, automating the reverse engineering takes the fun out of the problem :p if each of those functions was only checking one of the bytes, you could solve each fairly simply, I'd imagine.
nice
nice
nice
nice
nice
nice
even if i didn't understand anything, all i could to say is that the humanity is still good that person like you still exist, thanks a lot
idk man, he's writing P*thon
2:55 in and already 100% worth watching. Knowing I can use Ghidra without migraines is such a performance booster.
This ain't low level chanel this is high level chanel I learn a lot
Also thx LLL
chanal
@@basedfacistman you see...
FAST LOOK AN ALIEN
Nah just a bird, oh look chanel. I wonder what happened
*channel
@@vnc.t the n went on vacation
LLL feels more Supreme than Chanel
Thanks for increasing the font size LLL 📱
Whole thing went above my head but I still watched... Soon it will go in my head... IDK when
Totally. So often for me, understanding comes through the side door unannounced.
@@iwakeupsad haha.. yeah.. unexpectedly..
thank you for all these vids, they helped me with the basics of reverse engineering. I'm currently working on reverse engineering a ps3 game and it's been incredibly fun so far
MGS4?
@@Pr0xima_audio NieR : Gestalt
Looks like a lot of fun once you understand what's going on and know ways you could tackle the proble
Honestly this is pretty interesting, I NEED MORE OF such content PLEASE.
For anyone here new to Python,
if __ name __ == "__main__":
main()
prevents the main function from running when you import the file/script somewhere else. If you call a function after defining it without this check, it will run even if the file is imported, which you usually don't want
Edit: had to insert spaces between the underscores and name because YT thought I wanted it italic. In actual code, it would be 2 underscores, name, 2 underscores (no spaces between); sometimes read as "dunder name" (concatenating/abbreviating "double underscore" to "dunder")
8:40 I am not a fan when people make negative comments about someone's use of a tool to complete a task. Programming doesn't need more elitism or stupid battles.
I read your comment before watching that part and I totally got the wrong idea lol
Thought you meant that no-code "hackers" should not be looked down upon.
To which I disagree.
But by "tool" you were referring to the choice of language, to which I agree, hacking is a mess either way, the choice of language should not matter as long as it does the job.
How is it only now I find this gem of a channel? Dang youtube
I've never commented on a video before, but I had to for this one. It's that good!
excellent content!! enjoy your thorough analysis.
Thats how you know he is a _real manly_ C/C++ programmer, he apologies for using Python, and as a fellow C/C++ programmer I forgive you.
Jokes aside, good video!!!
Thank you, LLL, the font size saved me :)
what if the binary was built in something else like Rust for example? whould then Ghidra reverse engineer it to C or to Rust?
The decompilation target language doesn't matter.
If you can compile source code to *native* bytecode, you can reverse it if you know the bytecode's target ISA (e.g. x86, x86_64, AMD64, various versions of ARM, et cetera). Some bytecode is *not* natively compiled such as WASM, CIL, and Java bytecode.
C is preferable for decompilation because it normally has very little abstraction and is *almost* 1:1 with assembly language. C runtimes or compilers usually inject boilerplate for setup of heap memory management.
What keyboard are you using? I like that it's not a crappy loud mechanical keyboard, that even your neighbours could hear through three walls. Is it the same in your current videos?
So *why* does angr have issues with stdin and how were you able to work out the fix?
Why - just speculating here, because cpp streams are weird.
How - he has emulated the result of the text input himself, he put the string pointer on the stack (this is exactly what that cpp function does after fetching the text), and he has skipped the stdin function.
bro I could watch this every day that was awesome
Thanks for zooming in!
14:37 - Hold up. Where did these magic hex numbers come from? Why those offsets? Can they be determined in a cleaner way, rather than hard coded like that?
Did you find out this part? also need help here!
I love your merch, I have the mousepad and the t-shirt, do you have any other plans for more reverse engineering or low level related merch? I would totally buy more
would be great to see more complicated examples of using angr
Now crackmes are cool but whos gonna actually have good info on compiling osx/xnu kernel, modifying kernel/writing a kernel driver to disable debugging detection, bypass address randomization. What for? Oh yeah, just to bypass debug detection and also have a way to dump consistent traces. And just to begin on actually getting progress with 20mb+ binaries
Angr looks really neat. I suppose in some cases one runs into formal undecidability. How does it "cheat'"?
Ngl I am pretty new to low level stuff but I recommend running it a bit first before even running strings
I love this channel.
Nicely done, Mr LLL.
why on earth do you not have the link to the cracksme in the description man
I am looking forward, when we can take a binary and automatically turn it with AI in beautiful source code with comments etc.
The man, The myth, The legend. Found you again
Great video! Very informative and well explained.
How do i find the CTF program, can you link it to me so I can do all the steps myself?
Great video, I'm new to this stuff. couple of doubts, when giving the address of the good and avoid case, why is only 4byte address is provided instead of entire address from memory map? secondly, how the hell do you learn all there stuff? since there are multiple libraries/tools.concepts used just for one problem. Impressive btw!
I'm curious how angr works with ASLR enabled.
When running with correct permissions you can choose to disable ASLR for a spawned process which is likely what angr does. GDB uses the "personality" syscall to do this with the flag ADDR_NO_RANDOMIZE.
@@nomio_o ah, good to know.
this is some dark art shit- only able to follow a little of it, but interesting
Can you make a video on how this would work when an application also has a DLL etc? ive tried this once on an application with a DLL and it got very confusing, really couldnt figure any of it out.
Hey , very nice intro to angr, i have a bit that i didn’t get is why the first try with the 32.8 bit key space reached in the simulator the last address ? That for me doesn’t yet click
why the -0x58? where does it come from?
I wasn't worried about the empty boxes, until you said something LOL.
I loved the video; I didn't understand anything, but it was an excellent video.
Do you have any recommendations on books that are useful desk references for this stuff?
we finally got ghidra in dark mode
how can I change ghidra to dark mode?
Awesome work !
Wait are you a cuber as well?
Is scanf still using self modifying code or something ?
thanks for increasing the size mr lll :)
Goodluck...sir... perfect
Thanks for the Font LLL!!!!
Can you do a Ghidra tutorial pls?
Ik that’s it’s been a while, but thx LLL!
Thanks for your channel. I would love it even more without the background music.
Cool, next do Denuvo. Let's see how good you are!
Thanks LLL
do you prefer intel or at&t syntax?
intel of course
@@grandmakisses9973 Based opinion
intel addressing syntax and at&t argument order ("mov rax (to) rcx" makes more sense than "mov (to) rcx: rax")
@@atijohn8135 The thing is, binary instructions follow the intel syntax. So, especially for those who create compilers, the AT&T syntax is confusing, even tho it makes more sense...
AArch64
do you use computer with arm cpu?
yes, yes.. of course i understand all this
Low level programming is the hardest my bro
ReSearch about it.
May be a dumb question, but why not brute force it instead?
If you can do this technique then it's far superior to brute forcing. Brute force would take far longer.
I needed the font size increase and I'm on desktop lol. Thanks LLL
Can you crack how to exit vim?
When machines take over us, I hope you speak for us all as you know their native language. Interesting to watch, don't hava a clue about how anyone can learn those skills... :D
cool. now how do i guess what a weird 8 byte value does?
The magic starts at 15:44 😃
Thx lll for zooming in
I need to learn how to do this proficiently so I can hack car ECUs for tuning. They made it so hard to tune cars these days...
Thanks triple o
There's a piece of abandoned niche commercial software which I'd love to crack for archival purposes. Will this work on it? It's written in Delphi and it can be activated offline even though there was an internet activation option (which obviously doesn't work anymore).
There is version 3.x which is still being sold even though there were no updates for 8 years or any activity from the dev whatsoever. Thing is, version 3.x is a joke. Well, 2.x was an actual joke, not worth a penny, and 1.x is the legendary version which I'd like to crack. I believe it would still be used today if the dev released a 64bit version like he promised :( The released version crashes way too often because of the ram limitation.
...I need practise "hello world!" again, 60th time
I didn’t like that was necessary to use angr to solve the challenge
Thanks tripple el
THANKS LLL
Waiting for LLL x LaurieWired video :)
Dark mode, let's go!
Thanks LLL
Hi please make more
It’s so weird knowing that the NSA has a program named after the Godzilla monster
Remember that it's still nerds inside NSA that are responsible for creating and maintaining this. If they can get away with it, they will.
@@VivekYadav-ds8oz Ofc, every major tech system has been built up and maintained by nerds. It’s still pretty wild regardless
Wait, how are you running arm code on your machine?
perhaps a VM
@@tronosgamingwizard does ghidra run on ARM? I guess with the magic of editing (or ssh) he could be on different machines
@@ffeliziani I'm unable to answer this one, mate.
Sorry yeah the Q should have been for @lowlevellearning
@@ffeliziani It's Java. So if the JVM runs on ARM then it will (more/less) run.
Thanks LLL.
you are the best
Meh, automating the reverse engineering takes the fun out of the problem :p if each of those functions was only checking one of the bytes, you could solve each fairly simply, I'd imagine.
Great!
Someone should write an ANGR-y UI for gui people
Man you don't have to apologize for python. You don't have to apologize for anything!^_^
nothing is clear, but very interesting 🤠
Thx 3xL
Thanks LLL
what does SAT mean?
satisfiability solver
You unbaked the bread!
the a/v desync lmao
Thanks triple L - in the chat!
a prerequisite for this video is ReactJS
Literally no lol
😂😂😂😂@@LowLevelTV
@@LowLevelTVTrue, it is actually VueJS! 😂
LFG!!!! LLG GANG GANG!
Symbolic Execution 🔥🔥
That angr math solver didn't make any sense lol
Thanx Triple L
Tack 3xL
Thanks LLL. Still needs to be bigger for my blind ass 😂