HackadayU: Reverse Engineering with Ghidra Class 2

Поделиться
HTML-код
  • Опубликовано: 5 авг 2024
  • This is Class 2 in Reverse Engineering with Ghidra taught by Matthew Alt.
    Learn with us: www.hackaday.io/u
    Playlist for the Reverse Engineering with Ghidra series:
    • HackadayU: Reverse Eng...
    0:00 - Intro
    3:08 - Assembly Language / Applying Function Signatures
    8:49 - Imports and Exports
    10:23 - Control Flow Statements in Assembly Language
    18:10 - Switch Statements in Assembly Language
    24:34 - Loops in Assembly Language
    32:42 - Variables in Assembly Language
    39:46 - Functions in Assembly Language
    48:08 - Heap Memory
    50:11 - Array Accesses in Assembly Language
  • НаукаНаука

Комментарии • 20

  • @hackaday
    @hackaday  4 года назад +7

    Hi everyone! I hope that you enjoy the content we put together for these videos.
    If you have questions, feel free to reach out to the Instructor on twitter twitter.com/wrongbaud.
    All of the course details can be found here: hackaday.io/project/172292-introduction-to-reverse-engineering-with-ghidra

  • @suniliyengar8653
    @suniliyengar8653 2 года назад +6

    This class series is the best I have seen so far. I am so impressed by the clarity of the explanation. This course just made me enjoy learning so much!
    Thank you, you are the best teacher.

  • @ITOzann
    @ITOzann 4 года назад +4

    Thank you for the content!

  • @Yocairo
    @Yocairo 3 года назад +4

    Good course material, thanks!

  • @redpillcommando
    @redpillcommando 4 года назад +3

    Thank you for this video.

  • @Mishanya00
    @Mishanya00 9 месяцев назад +1

    Thanks, you have a very good lesson series of Ghidra

  • @ivanrubalcava7109
    @ivanrubalcava7109 Год назад

    Thank you very helpful!👍

  • @baruchben-david4196
    @baruchben-david4196 3 года назад +2

    Thank you for this clear explanation. I appreciate it.

  • @kapilk1440
    @kapilk1440 Год назад

    Any idea about calling convention for Windows userland applications such as IE, Edge, Adobe Reader and Foxit Reader etc? Do they use CDECL, STDCALL or FASTCALL? 🤔

  • @skrmnghrd4520
    @skrmnghrd4520 4 месяца назад

    Hello People! and Matt! I can somewhat get around the ASM code and seeing how it works, but I cannot wrap my head around the passcode on the "variables-example" exercise. I tried RE-ing with the sourcecode and even tried printing the values of the results, but I still do not know what to input in the terminal as the keyword. Anyone have a tip for this?

  • @DemoList-hz8ht
    @DemoList-hz8ht 2 месяца назад

    i dont understand this line 52:53
    64c: lea rcx,rax*4+0x0
    65e: mov DWORD PTR [rcx+rax*1],edx
    why *4+0x0 and *1, can someone explain to me ? thank guys.

  • @RevUntoMan
    @RevUntoMan 3 года назад +2

    This course is great! I'm learning a lot!
    Does anyone have a walkthrough for solving /variables-example ?

    • @ahmedadel3301
      @ahmedadel3301 2 года назад

      If you did it, could you share the solution?!

    • @RussellTeapot
      @RussellTeapot 4 месяца назад

      @@ahmedadel3301 I assume you moved on by now :D but for everyone that's stuck, I cheated a bit: I just wrote a C program that prints the correct characters applying the operations found in the decompiled pseudocode provided by Ghidra. Pay attention to the global variables involved ;)
      I wont disclose anything else tho, good luck :)

  • @TheMateusz535
    @TheMateusz535 2 года назад

    Hi, could you please provide any clue to loop-example-1? I know it has to be 15 char long, but I have no clue how to satisfy if statement only 8 times in order to to set local_10 to 8.

    • @ahmedadel3301
      @ahmedadel3301 2 года назад

      check the values at the ascii table

  • @drygordspellweaver8761
    @drygordspellweaver8761 Год назад

    Why did the global var have different address offsets?

  • @JNET_Reloaded
    @JNET_Reloaded 4 года назад

    I just uploaded a new linux related vid check out it and let me know what you think please!

  • @doublepositivezero8329
    @doublepositivezero8329 3 года назад

    I'm sorry, paying to have what competitive edge?

  • @xdonvito
    @xdonvito 2 года назад

    Death by PowerPoint