Introduction to reverse engineering - Stack frames, prologues and epilogues

Поделиться
HTML-код
  • Опубликовано: 15 дек 2024

Комментарии • 13

  • @SangharshSeth
    @SangharshSeth 4 года назад +1

    nice video btw what does mov ebp,esp do can you explain a bit more

    • @nikolayzapryanoff1032
      @nikolayzapryanoff1032 3 года назад

      mov = move. It is an operation.
      ebp and esp are CPU registers.
      Just to put you in context... He is explaining how a function is called in C at machine code level.

  • @hamzahm7767
    @hamzahm7767 2 года назад

    a very nice video. I have a question please: They always say, we add the canary values (StackGuard) into the prologue function, how is that? thank you very much :)

    • @paladingroupllc3480
      @paladingroupllc3480  2 года назад +1

      yes that is correct to protect the stack the canaries are placed below the return address on the stack such that if you generally need to overwrite the canary to overwrite the return address.

    • @hamzahm7767
      @hamzahm7767 2 года назад

      @@paladingroupllc3480
      that is right, but please the question is: How can I do that my self? (editing the prologue and epilogue and add canaries)
      thank you very much ^^

    • @paladingroupllc3480
      @paladingroupllc3480  2 года назад

      @@hamzahm7767 The way you do this is to recompile your software on linux us -fstack-protector on windows I think? it's /GS. basically teh compiler puts it in. you COULD binary edit your exiting code potentially but that would be a mess.

  • @human3rr0001
    @human3rr0001 4 года назад

    Thank you so much

  • @Seaprimate
    @Seaprimate 5 лет назад

    Thanks for the video. What are your thoughts on using GDB for analyzing disassembled code?

    • @paladingroupllc3480
      @paladingroupllc3480  5 лет назад +2

      I like using GDB the gdb disassembly for analyzing small areas of code where I might currently be looking, and understanding stack layout, however for large areas of code I used to us IDA pro, however the NSA just this month opened sourced their decompiler called Ghidra (ghidra-sre.org). I tried it out and though it's rough around the edges especially the user interface it's incredibly powerful and free. even better looks like it does de-compilation! IDA's de-compilers costs nearly $4000.00 PER architecture. I'd recommend you try out Ghidra if your looking at anything large I might move away from IDA especially if the open sourcing gets people to contribute and make it even better than it is now. in the future if time permits I might make some videos on using it. In the download there's a "Docs" section which has what looks to be "classes in PDF form" on how to use it!

  • @gowthamanv8740
    @gowthamanv8740 5 лет назад

    Hey, I am new to this channel. nice video. I really like very much.
    Put a video about how executable files load into computer and runs?
    That means, when we execute ./a.out , what happens behind the scene. How elf binary files executed by OS?. Please explain.

  • @b213videoz
    @b213videoz 5 лет назад +3

    I found a bug in your code, it's NOT just radius BUT radius squared: Area = radius * radius * Pi