HackadayU: Reverse Engineering with Ghidra Class 2
HTML-код
- Опубликовано: 5 авг 2024
- This is Class 2 in Reverse Engineering with Ghidra taught by Matthew Alt.
Learn with us: www.hackaday.io/u
Playlist for the Reverse Engineering with Ghidra series:
• HackadayU: Reverse Eng...
0:00 - Intro
3:08 - Assembly Language / Applying Function Signatures
8:49 - Imports and Exports
10:23 - Control Flow Statements in Assembly Language
18:10 - Switch Statements in Assembly Language
24:34 - Loops in Assembly Language
32:42 - Variables in Assembly Language
39:46 - Functions in Assembly Language
48:08 - Heap Memory
50:11 - Array Accesses in Assembly Language Наука
Hi everyone! I hope that you enjoy the content we put together for these videos.
If you have questions, feel free to reach out to the Instructor on twitter twitter.com/wrongbaud.
All of the course details can be found here: hackaday.io/project/172292-introduction-to-reverse-engineering-with-ghidra
This class series is the best I have seen so far. I am so impressed by the clarity of the explanation. This course just made me enjoy learning so much!
Thank you, you are the best teacher.
Thank you for the content!
Good course material, thanks!
Thank you for this video.
Thanks, you have a very good lesson series of Ghidra
Thank you very helpful!👍
Thank you for this clear explanation. I appreciate it.
Any idea about calling convention for Windows userland applications such as IE, Edge, Adobe Reader and Foxit Reader etc? Do they use CDECL, STDCALL or FASTCALL? 🤔
Hello People! and Matt! I can somewhat get around the ASM code and seeing how it works, but I cannot wrap my head around the passcode on the "variables-example" exercise. I tried RE-ing with the sourcecode and even tried printing the values of the results, but I still do not know what to input in the terminal as the keyword. Anyone have a tip for this?
i dont understand this line 52:53
64c: lea rcx,rax*4+0x0
65e: mov DWORD PTR [rcx+rax*1],edx
why *4+0x0 and *1, can someone explain to me ? thank guys.
This course is great! I'm learning a lot!
Does anyone have a walkthrough for solving /variables-example ?
If you did it, could you share the solution?!
@@ahmedadel3301 I assume you moved on by now :D but for everyone that's stuck, I cheated a bit: I just wrote a C program that prints the correct characters applying the operations found in the decompiled pseudocode provided by Ghidra. Pay attention to the global variables involved ;)
I wont disclose anything else tho, good luck :)
Hi, could you please provide any clue to loop-example-1? I know it has to be 15 char long, but I have no clue how to satisfy if statement only 8 times in order to to set local_10 to 8.
check the values at the ascii table
Why did the global var have different address offsets?
I just uploaded a new linux related vid check out it and let me know what you think please!
I'm sorry, paying to have what competitive edge?
Death by PowerPoint