GHIDRA for Reverse Engineering (PicoCTF 2022 #42 'bbbloat')

Поделиться
HTML-код
  • Опубликовано: 23 янв 2025

Комментарии • 136

  • @_JohnHammond
    @_JohnHammond  22 дня назад +1

    is this real life? or just fantasy? so about that if you want more security stuff check out jh.live/training and join up at jh.live/newsletter 👀

  • @micleh
    @micleh 2 года назад +26

    Liked that one, since it is an easy example of how to disassemble code and make sense of what is readable. Perfect as a beginner tutorial.

  • @deltabytes
    @deltabytes 2 года назад +87

    I like the way you take us through step by step. I am learning a lot from these videos.

  • @sk0r
    @sk0r Год назад +2

    I’ll be honest, a lot of your videos I have no idea what you are doing, but I enjoy watching you and your skill set and what is possible with the right tools. 🙏

  • @11ph22il
    @11ph22il 2 года назад +9

    These videos are the spam I like to get, each one with GREAT info on CTFs.
    Thanks John!

  • @Riiveri
    @Riiveri 2 года назад +6

    I have no idea why RUclips decided to recommend me these videos but I'm glad it did. This is awesome!

    • @vivarantx
      @vivarantx 2 года назад +2

      same here, I was watching people eating 30 bags of cheetos and I ended up here

    • @kiizuha
      @kiizuha Год назад

      @@vivarantx lmao

  • @kadericketts9218
    @kadericketts9218 2 года назад +5

    Been loving the PICO CTF videos you’ve been making have watch most of them and have been learning a lot as i am just a noob in IT

  • @tpai302
    @tpai302 2 года назад +13

    I'm so bad at RE but love watching others do it so I can pick up on little things each time.

    • @jackscalibur
      @jackscalibur 10 месяцев назад +1

      Hey! Do you feel like you're better at it now?

    • @domzzy6432
      @domzzy6432 5 месяцев назад

      Are you good at it now?

  • @MikeDSutton
    @MikeDSutton 2 года назад +81

    In case anyone else was curious what the 'unscramble_flag' function did, here's the rough equivelent in Python 3:
    bytes([ b + (0x2F if b < 0x50 else -0x2F) for b in bytes([
    0x41, 0x3a, 0x34, 0x40, 0x72, 0x25, 0x75, 0x4c,
    0x34, 0x46, 0x66, 0x30, 0x66, 0x39, 0x62, 0x30,
    0x33, 0x3d, 0x5f, 0x63, 0x66, 0x30, 0x62, 0x65,
    0x35, 0x35, 0x62, 0x60, 0x65, 0x32, 0x4e ])
    ])

    • @Lampe2020
      @Lampe2020 Год назад +4

      I first saw the code then the description you gave but I immediately recognized it as Python3-code because two of my last three Python3-projects involved exactly that, converting lists of numbers between 0x00 and 0xff to byte strings (`bytes` object) XD

  • @kr4k3nn
    @kr4k3nn 2 года назад +3

    This is my first time seeing Reverse Engineering. I am like WOW, this is so fun to watch & do. THanks John for introducing this very interesting things to us. :)

  • @DevBranch
    @DevBranch Год назад

    Thank you for making these videos! I'm new to this, so being able to see how this works first-hand is extremely helpful.

  • @Dex_Lulz
    @Dex_Lulz 2 года назад

    The more spend I time on your channel the more I learn.

  • @hardelectrolove
    @hardelectrolove 2 года назад +59

    Did you just accidentally release every video for the next weeks/months at once? Holy moly, that's a lot of stuff in my Watch Later playlist now! x)

    • @VA3KAMA3
      @VA3KAMA3 2 года назад +6

      same. just have had a marathon watching them

    • @theamazingjay161
      @theamazingjay161 2 года назад +4

      Okay, so I'm not the only one.

  • @ThomasAbraham-s6v
    @ThomasAbraham-s6v 9 месяцев назад

    Man u r DANGEROUS! lol 🙃☺ keep ur great work up dude! 💪

  • @P-G-77
    @P-G-77 Год назад +1

    Love this intricate logic tricks.

  • @inazumaeleven9102
    @inazumaeleven9102 2 года назад +1

    I like the fact that in each ctf videos, I learn new tools to use for hacking. Now I check the bell icon. Keep on going man, u the best

  • @FakeMichau
    @FakeMichau 2 года назад +1

    RUclips after seeing so many uploads: i'm gonna end this man's whole career

  • @1234enzor
    @1234enzor Год назад

    A flashback and relearning TY!

  • @HyBlock
    @HyBlock 2 года назад +48

    couldn't this be done in some other way, my feed is filled with all those uploads making it harder to browse, don't wanna unsubscribe cus I appreciate your work though!

    • @TheJustinist
      @TheJustinist 2 года назад +5

      Yep, unsubbed

    • @KoskiK
      @KoskiK 2 года назад +1

      Quite the same, after the first burst of videos I figured it was just a mistake or an error with the scheduler. After this new one I unsubbed unfortunately, as I enjoyed the content. RUclips should by now have made a limit, say 3 posts of a single person in the sub feed.

    • @ocoolwow
      @ocoolwow 2 года назад

      @@KoskiK ah that would actually assume that RUclips would output usable work

    • @zdrasbuytye
      @zdrasbuytye Год назад

      You can do reverse engineering with the Linux shell only .

  • @kevinalexander4959
    @kevinalexander4959 2 года назад +2

    Would love to see a video on rebasing. I have a hard time with alignment using strings. Would love a newbie friendly of you rebasing binaries that do not align in disassembler. thanks!!

  • @WorldAquariumSingapore
    @WorldAquariumSingapore 3 месяца назад +1

    super and i am 2 years late watching your vid

  • @HYPR.trophy
    @HYPR.trophy 2 года назад +1

    I appreciate hearing your thought process as you go through the challenge

  • @ronorocky
    @ronorocky 2 года назад

    i just love you man,you are just awesome....... hope someday i will meet u in person.... u r doing a great job... keep it up. ❤️❤️

  • @SamoCoder
    @SamoCoder 2 года назад

    This was interesting. Liked and subscribed.

  • @cod4volume
    @cod4volume 2 года назад

    As far as open source content goes, John, you’re an OG. A goat. Appreciate the content and knowledge dude, stay humble.

  • @for14556
    @for14556 Год назад

    Very nice video about rev, thx.

  • @KGAD0831
    @KGAD0831 2 года назад

    I really liked this one.

  • @tech-wandeveloper7495
    @tech-wandeveloper7495 2 года назад

    That was cool man!

  • @hvacinstalacije1985
    @hvacinstalacije1985 2 месяца назад

    Can you decode and file from ECU which usually .bin file, how we will be able to find the maps for tuning for new ECU

  • @DanjumaMuhammad
    @DanjumaMuhammad Год назад

    I like the term "low-hanging fruit 🍓" 😊

  • @aurelienlevra3782
    @aurelienlevra3782 9 месяцев назад

    Great video

  • @claytonautoshmotive
    @claytonautoshmotive 2 месяца назад

    First of all, you're incredibly talented and even though I only comprehend bytes here and there its always interesting to follow along. My limited experience in reversing all took place in Olly x64/32 and recently hit a wall with some software for an automotive interface i paid good money for several years ago.. the mfgr ended support for it so theyre no longer supplying the updated "launcher" software that basically hijacks the proprietary diagnostic platform for the Blue Oval. The magic happens during the app startup process as long as the interface is connected to the car and the laptop via prolific serial over usb cable. Im not sure how to get olly to follow this process since the launcher software only exists to launch the official application without those pesky license requirements. I really just want to edit the last launcher update i got to get it to load the newer version of the main application. serval sources have figured it out and charge for their Re-Hack of the Hacked app and i would rather make the adjustments myself if i can just get started in the right direction. long winded sorry, its a simple (ish) app thats strangely hard to describe in a short and sweet mannor lol. how can i get a good breakdown of what its doing? TIA

  • @victorkuria4734
    @victorkuria4734 2 года назад

    Great stuff

  • @ancestrall794
    @ancestrall794 8 месяцев назад

    Awesome bro

  • @mytechnotalent
    @mytechnotalent 2 года назад +1

    Love me some Ghidra!

  • @makayjozsef
    @makayjozsef 2 года назад +1

    You can use "apt search" too for package searching

  • @gogogg91
    @gogogg91 2 года назад

    Awesome!

  • @bkib
    @bkib 2 года назад

    Nice!

  • @sem8973
    @sem8973 Год назад +1

    This would have been a perfect intro tutorial to reverse engineering with Ghidra

  • @lancemarchetti8673
    @lancemarchetti8673 2 года назад

    Hi John, can you please review "angr" for us. I don't have a clue where to start...lol

  • @tomwhite-1288
    @tomwhite-1288 2 месяца назад +1

    I think if you just made it so the instead of if it equals the hexadecimal, does not equal that, then run the program, and any number will give you the flag.

  • @msalih
    @msalih 2 года назад

    Awesome

  • @krishanuchhabra
    @krishanuchhabra 2 года назад

    Nice one

  • @wonderweissmargela4261
    @wonderweissmargela4261 2 года назад

    Easy with the upload sir

  • @polinimalossi8404
    @polinimalossi8404 2 года назад

    but you can make the same video with the imusic aimersoft program?

  • @codedsprit
    @codedsprit Год назад

    I wish I had a nice laptop like yours 🥺

  • @hh7xf
    @hh7xf 2 года назад

    you should also check out cutter

  • @skeeberk.h.4396
    @skeeberk.h.4396 2 года назад

    Very Nice

  • @WayneModz
    @WayneModz Год назад

    I guess its kinda good you didn't have the environment requirements preinstalled

  • @ashokshastri9101
    @ashokshastri9101 Год назад

    Sir big fan of yours from Lamatol village, golbazar-06 municipality, siraha district, sagarmatha zone, Madhesh Pradhesh (province no 2), nepal 🇳🇵

  • @vinnie3265
    @vinnie3265 Год назад

    Everytime I Try to run a binary file on my kali linux I am getting exec format error...so I am not able to solve any rev engineering problems....can someone plss help with it🙏🙏🙏🙏

  • @heisenberg8055
    @heisenberg8055 Год назад

    TF I just watched! Interesting

  • @yttos7358
    @yttos7358 2 года назад +1

    Another way of converting from hex to decimal is with the `printf` command which can be found on any linux system; use `printf %d 0xc0ffee` to see

  • @tribblewing
    @tribblewing 8 месяцев назад

    My etc/apt/sources.list is using Kali Linux's default repo, but I can only install strace. ltrace keeps getting an error: "Unable to locate package". Has anyone figured out a working alternative repo?

  • @superfish4603
    @superfish4603 2 года назад +1

    There are 11 hidden videos in the playlist, when do we get them? :)

  • @SpencerNold
    @SpencerNold Год назад

    Headless for Java means its stripped of mouse and keyboard input libraries and whatnot. Badly breaks java swing, so you probably don't want to use that.

  • @cryproot9845
    @cryproot9845 2 года назад

    It's a good video

  • @noodlechan_
    @noodlechan_ Год назад

    what if we reverse engineer Ghidra binarys using GHidra?

  • @m4rt_
    @m4rt_ 2 года назад +1

    6:20 (sdkman is a good tool for downloading java stuff)

  • @Lampe2020
    @Lampe2020 Год назад

    The word "Bbbbbbbloat" is a bloated word and has the same effect as a mass of bloatware has on a PC: it works, but slower.

  • @saranvishva7982
    @saranvishva7982 7 месяцев назад

    what will happen if I swap the iF and else condition

  • @TheofilosMouratidis
    @TheofilosMouratidis 2 года назад +5

    at 13:26 you already got the decimal by hovering over the number

    • @MrLetsGamePlayHD
      @MrLetsGamePlayHD 2 года назад

      In ghidra you can also change the display type

  • @JessicaMerry-f1i
    @JessicaMerry-f1i Год назад

    Please 🙏 sir can I use this to do reverse engineering on my mobile app??? Can someone help me out

  • @iamtimsson
    @iamtimsson 11 месяцев назад

    oh look a user agreement, "i agree"
    never to be thought of again

  • @passaronegro349
    @passaronegro349 2 года назад

    ...would it be possible to have subtitles in Portuguese ???

  • @znucii
    @znucii 2 года назад

    MAHYOUB WE MISS YOU

  • @Itsmeattacker
    @Itsmeattacker 2 года назад

    hello sir your videos are great it helped me for solving and understanding all the ctfs of thm

  • @abiodun6897
    @abiodun6897 2 года назад

    i got it 🙋🏾‍♂️. where can i learn this reverse engineering

  • @untitled8027
    @untitled8027 2 года назад

    nice

  • @MisterK-YT
    @MisterK-YT 2 года назад +3

    John can you post the code that formats your bash (or zsh) prompt? From your .bashrc or wtvr config file.
    I like that two-line prompt.

    • @Mathcartney
      @Mathcartney 2 года назад +1

      Its zsh the shell that he uses, it isn’t bash. And the theme is the default kali theme. There are many other custom themes and wrappers such as powerlevel10k if you dig it deeper tho

  • @AliYar-Khan
    @AliYar-Khan 2 года назад +1

    Can we reverse engineer malware and then remove them this way ?

    • @bmbiz
      @bmbiz 2 года назад +4

      That's pretty much the _only_ way to remove previously unknown malware: reverse engineer it, figure out all changes it makes and then undo all those changes on an infected system.

  • @DipakJadhav-vv2eu
    @DipakJadhav-vv2eu 18 дней назад

    I am having fun.

  • @aaravinthan001
    @aaravinthan001 2 месяца назад

    Bro it is possible to convert intel hex to c code using this

  • @mikerich5003
    @mikerich5003 2 года назад

    Has anyone on bohemia has their initial deposit asst changed..

  • @tlocto
    @tlocto 2 года назад

    can't wait till you go over noted, was my favorite one

  • @roachxyz
    @roachxyz 2 года назад

    What is this stuff called? Cybersecurity?

  • @marcoamendoza5283
    @marcoamendoza5283 Год назад

    Does anyone have the bbbblob file to try it out?

  • @MygenteTV
    @MygenteTV 2 года назад

    wtf, this is weird I had been watching your videos and even follow you in LinkedIn for years and just found out I wasn't subscribed to your channel. RUclips be playing tricks, they welcome you with your favorite channel for ever and you will never know you weren't subscribed because everytime you open youtube and see the same person there you automatically think you are subscribed

  • @wahabwahab2042
    @wahabwahab2042 2 года назад

    im watching your video and honestly i'm 80% didn't understand what are you doing exactly.
    i wonder what level is that ? im sure it is advanced level .
    where to start to achieve your level ??

  • @2b2tJourney
    @2b2tJourney 2 года назад

    Wait this is intresting

  • @leblanc666666
    @leblanc666666 2 года назад +3

    nice and simple, but fun nonetheless!
    Does picoCTF have have challenges that are more based on web applications?

    • @iKilleasy007
      @iKilleasy007 2 года назад

      picoCTF has a web exploitation category

  • @Bromon655
    @Bromon655 9 месяцев назад

    What is the Linux wizardry… dude was flying through the terminal like nobody’s business

  • @SultanSaadat
    @SultanSaadat 2 года назад

    can you send us your shell modifications? This looks so cool.

  • @MisterK-YT
    @MisterK-YT 2 года назад +1

    Question: why didn’t he “trust” the Ghidra from the official Kali repo? Why go through the process of installing manually??

    • @SheIITear
      @SheIITear 2 года назад +6

      Stuff from the repos on your distro tend/might be really old. In case of ghidra you just download and extract it so thats the fastest way to get the latest.

    • @MisterK-YT
      @MisterK-YT 2 года назад

      @@SheIITear noted! Thanks!

    • @vaisakh_km
      @vaisakh_km 2 года назад

      I wanted to ask same. I thought it might be the reason but to make sure...
      Is that a problem with distros like fedora or arch!?... those are more up to date than Debi an right!?

  • @MasterRg-cj7tt
    @MasterRg-cj7tt 2 года назад

    Hi , I am new PicoCTF . and i try to solve that for practice if i cant i am looking for in google for solving . But I cant find picoCTF notepad Author: ginkoid . Can you help me? How can i solve that

  • @Bowzerbro
    @Bowzerbro 2 года назад

    👍

  • @afrkleaks4991
    @afrkleaks4991 Год назад

    I do not have time with all these load it opens this read there and there then crack it i refuse all these stuff at the end you have to find the way to get in to the software, easy ways quickly just load malware to infect

  • @anujsrivastav6444
    @anujsrivastav6444 2 года назад

    Hey jhon can you please tell me how I can trace the memory leak from heapdump file?

  • @ultimultig
    @ultimultig 2 года назад

    cool but i didn't understand a single word said in this video

  • @mideno7619
    @mideno7619 2 года назад +1

    Sup

  • @metsfaninct
    @metsfaninct 2 года назад

    Man, nothing like getting spammed. Should have spaced it out.

  • @BigWin24410
    @BigWin24410 2 года назад

    Is this the apparently kid all grown up?

  • @WaseemLaghari
    @WaseemLaghari Год назад

    I solve it by viewing your video but you did it late by looking for other stuffs. Maybe you do to let us all understand everything

  • @ocoolwow
    @ocoolwow 2 года назад +1

    You gotta stop man, this is flooding my sub box

  • @KirwinWebb
    @KirwinWebb 2 года назад

    You seemed disappointed that you got the flag so quickly.

  • @CodyHoskin
    @CodyHoskin 2 года назад

    Have you ever got a live virus on your own system? Or a RAT?

  • @utensilapparatus8692
    @utensilapparatus8692 2 года назад +1

    John 1337 the king

  • @patrickborys3490
    @patrickborys3490 2 года назад

    ez

  • @onizuka2345
    @onizuka2345 2 года назад +7

    Removed from my feed for uploading 18 videos at a time. You know how RUclips works and that is not how you do it.

    • @ocoolwow
      @ocoolwow 2 года назад +6

      Bye don't let the door hit you on the way out

  • @SuperHaptics
    @SuperHaptics 2 месяца назад

    Pretending its the first time you are looking at the code while having forgotten to edit out the clip that you actually stumbled upon it fot the first time.... no need to do that keep it real