Ghidra quickstart & tutorial: Solving a simple crackme

  Рет қаралды 328,907

stacksmashing

stacksmashing

Күн бұрын

In this introduction to Ghidra we will solve a simple crackme - without reading any assembly!
Twitter: / ghidraninja
Links from the video:
Crackme: crackmes.one/crackme/5b8a37a4...
Download Ghidra: ghidra-sre.org
Scrolling issue: github.com/NationalSecurityAg...

Пікірлер: 266
@MrMasterRhythm
@MrMasterRhythm 5 жыл бұрын
Please create a series of Reverse Engineering Basics! Love this!
@recklessroges
@recklessroges 5 жыл бұрын
Its like the perfect purity of a man page was compiled into a perfect video. Instructions so clear I accidentally cracked the travelling knapsack problem.
@matthewnoel2781
@matthewnoel2781 4 жыл бұрын
4:07 "a small popup will show up." popup occupies most of screen.
@goosenp
@goosenp 5 жыл бұрын
Brilliant "in a nutshell" tutorial of getting to know the program quickly. Could you please do a follow-up of the very same crack me, but with showing how you "crack" the crackme by patching the binary inside Ghidra so that it always jumps to the success condition regardless of the input given?
@gilperon
@gilperon 5 жыл бұрын
Wow is that even possible with ghidra?
@zitronenwasser
@zitronenwasser 5 жыл бұрын
Gil Bytepatching should be simple, worst case you just use like a Hex Editor and jump to the offset and manually patch ig
@hyronharrison8127
@hyronharrison8127 4 жыл бұрын
@@gilperon its possible i. Gdb, i would hope so! :)
@S00mbre
@S00mbre 5 жыл бұрын
Crystal-clear, methodical and systematic walkthrough! Thank you!
@l1703
@l1703 4 жыл бұрын
wow this tutorial is just perfect, the pace the explanations, everything ! Thank you
@TheMadMagician87
@TheMadMagician87 4 жыл бұрын
Excellent explanation. Clear, concise and a great pace, wasn't confusingly fast or laboriously slow. I hope you continue to make videos on Ghidra.
@willmcpherson2
@willmcpherson2 3 жыл бұрын
Beat tutorial I’ve ever seen. Clear, concise and simple.
@edgeeffect
@edgeeffect 3 жыл бұрын
I had a quick look at Ghidra a few weeks ago and it seemed rather complex.... It certainly seems a lot less complex now! Thanks.
@juozasmiskinis3590
@juozasmiskinis3590 5 жыл бұрын
Thanks ninja! A very well prepared video. Hopefully more will come :)
@dzikibill6756
@dzikibill6756 5 жыл бұрын
I love it , already subscribed !
@bv1495
@bv1495 5 жыл бұрын
Jesus you make it look so easy !! Love it ! Keep em coming my friend.
@andreww3575
@andreww3575 5 жыл бұрын
Fantastic. Hopefully looking forward to more of the same.
@theleopards4198
@theleopards4198 5 жыл бұрын
amazing man keep uploading ghidra tutorials
@namenone8387
@namenone8387 4 жыл бұрын
wow, nice introduction man. looking forward for more videos from you!
@user-qi6ig6gb8x
@user-qi6ig6gb8x 5 жыл бұрын
Thank you Ghidra Ninja. You are a true Ninja!!
@frederick3524
@frederick3524 4 жыл бұрын
You have 13.2K subscribers and only 3 videos from 8 months ago! This was such a great video, I was disappointed to see you didn't have more content.
@tyrrelldavis9919
@tyrrelldavis9919 4 жыл бұрын
Tech KZfaqrs always have their view count scaled way down
@TheChecklists
@TheChecklists 5 жыл бұрын
Your videos are awesome! Please keep making content like this!
@TheUnusualSuspect101
@TheUnusualSuspect101 5 жыл бұрын
awesome tutorial - keep them coming man!
@nan6849
@nan6849 3 жыл бұрын
Thank you for a great overview. I'm getting started quite easily because of this 👍
@GajoFanatico
@GajoFanatico 5 жыл бұрын
Excelent. We want more!! Really good tutorials
@abanjoplayer
@abanjoplayer 2 жыл бұрын
This helped so much, the main thing I needed was just the fact that you can click on named functions in the decompile window to go to them. Seems obvious but I just didn't know!
@mitfreundlichengrussen1234
@mitfreundlichengrussen1234 5 жыл бұрын
Thank you - and pls. continue the work. PS: made me smile.
@mohd1501
@mohd1501 5 жыл бұрын
Liked your explaination, easy and clear. Keep going please.
@playnikko
@playnikko 4 жыл бұрын
Great job explaining - thank you!
3 жыл бұрын
Love this. Keep up the great content man
@jtw-r
@jtw-r 10 ай бұрын
love the “NSA-Mainframe” on your terminal. I let out a good laugh at that!
@datenraffzahn6094
@datenraffzahn6094 3 жыл бұрын
Many thanks for suggesting this software ... I wanted to look into reverse engineering for years, but had not yet come across such an handy tool. AIDA wasn't really affordable for experimenting ... Again thank you very much!
@frankdai
@frankdai 5 жыл бұрын
"Let's maximize the window" > Actually makes windows smaller
@ytxstream
@ytxstream 4 жыл бұрын
And that's Mac OS for you
@Tedd755
@Tedd755 4 жыл бұрын
@@ytxstream ⌘ + ⌥ + d is your friend
@The_Ballo
@The_Ballo 4 жыл бұрын
@@ytxstream *Java's half-assed implementation of
@powershellaxp64
@powershellaxp64 4 жыл бұрын
He actually just moved it to the right.
@soulife8383
@soulife8383 3 жыл бұрын
^^ effing owned dude... 😅 By a Polock Frank... sick digs
@heycherry100
@heycherry100 4 жыл бұрын
Good and fast introduction!
@arieldelgadillo4674
@arieldelgadillo4674 5 жыл бұрын
Thanks man. I enjoyed you cracking that.
@magi-bv7nd
@magi-bv7nd 3 ай бұрын
very nice and efficient intro into ghidra gui
@negritoojosclaros
@negritoojosclaros 5 ай бұрын
very good video! Im already applying for NSA!
@drygordspellweaver8761
@drygordspellweaver8761 2 жыл бұрын
Very cool, I LOVE Ghidra so far
@valshaev1145
@valshaev1145 4 жыл бұрын
Nice introduction! Had have no idea abut Ghidra ;)
@encryptedmind6952
@encryptedmind6952 5 жыл бұрын
awesome video man,keep doing more basic malware analyasis and reversing.Thanks:)
@AterNyctos
@AterNyctos 7 ай бұрын
Extremely informative! Very good video!
@userusms
@userusms 5 жыл бұрын
Thank you for the nice tutorial!
@MichaelJenkin
@MichaelJenkin 5 жыл бұрын
Nice, I was looking for samples with known outcomes so I could follow the technique ! Awesome . (Mickyj Whitehat)
@cvspvr
@cvspvr 4 жыл бұрын
you've literally got a black hat on. don't lie
@osamazaid25
@osamazaid25 5 жыл бұрын
Great video. I learned a lot from it.
@NasirKhan-kh4zq
@NasirKhan-kh4zq 3 жыл бұрын
Thanks for wonderful tutorial. Subscribed.
@fade242black
@fade242black 5 жыл бұрын
Great video. Keep it up!
@urnan7499
@urnan7499 2 жыл бұрын
Jidra 😞😭 didnt think that video would stress me out this much 🥶🥶🤯
@victors8718
@victors8718 5 жыл бұрын
That's a great tutorial man ,thx!
@zraphy-veo5551
@zraphy-veo5551 6 ай бұрын
Oh my... this video is amazing! ❤
@georgensa3942
@georgensa3942 5 жыл бұрын
love it bruh... keep it up
@0xm3trix
@0xm3trix 4 жыл бұрын
The video was very helpful, keep it up bro👍👍
@nxxxxzn
@nxxxxzn 5 жыл бұрын
very thorough. thanks
@gilperon
@gilperon 5 жыл бұрын
Great Job! Keep up please.
@tomay3000
@tomay3000 3 жыл бұрын
Thank you, very instructive.
@karimessalim
@karimessalim 5 жыл бұрын
Great job
@osamaalbahrani
@osamaalbahrani Жыл бұрын
Great tutorial!
@TheUltimateLizard
@TheUltimateLizard 4 жыл бұрын
Amazing tutorial
@SoCalRobb
@SoCalRobb 5 жыл бұрын
Great content, subbed, keep them coming!
@gabrield6425
@gabrield6425 2 жыл бұрын
Thank you for this video!
@happyked
@happyked 5 жыл бұрын
Nice video! Do you plan on making more? Id love to see more videos on Ghidra :)
@gamingSlasher
@gamingSlasher 9 ай бұрын
Very nice. Great tutorial.
@SaintSaint
@SaintSaint 4 жыл бұрын
Watched first 11 seconds. subscribed. I think I'm only subscribed to a dozen people after over a decade of being on KZfaq.
@NotAViper
@NotAViper 4 ай бұрын
Very good tutorial
@VasaMusic438
@VasaMusic438 3 жыл бұрын
great !!! Please, more !!!
@ashokvj8342
@ashokvj8342 5 жыл бұрын
Thanks man for the knowledge you are awsm
@AA-gl1dr
@AA-gl1dr 4 жыл бұрын
Thank you so much!!!
@ColtonSpears
@ColtonSpears 5 жыл бұрын
Looking forward to more videos like this.
@Malaphor
@Malaphor 5 жыл бұрын
"Just hit okay because nobody reads those anyway" Well, I guess I'm a nobody.
@EchoXIIIGO
@EchoXIIIGO 5 жыл бұрын
You sir are a thought criminal reading those agreements... tut tut..
@MichaelJenkin
@MichaelJenkin 5 жыл бұрын
@@EchoXIIIGO I do recall about 10 years ago, a very prominent software vendor had an Easter egg in the terms and conditions. something about giving away your first born and pledging elegance to satan. It took about 5 or more years for someone to finally read it and mention it. (Mickyj Whitehat)
@thatcrockpot1530
@thatcrockpot1530 4 жыл бұрын
@benzo I highly doubt an opensource project would send data to the NSA, I feel like people are very aware of their role in the world, especially floss peeps.
@hexagonist23
@hexagonist23 4 жыл бұрын
You must know what you are agreeing to before you agree.
@b213videoz
@b213videoz Ай бұрын
In dialog boxes like that the only buttonnshould be renamed from "Ok" to "Whatever" 🤪
@oliviern.2095
@oliviern.2095 2 жыл бұрын
Great, really great !
@nuszkat9953
@nuszkat9953 4 жыл бұрын
Waiting for more videos from you.
@MySisterIsASlytherin
@MySisterIsASlytherin 3 жыл бұрын
nice intro! of course, there's any number of possible solutions given that the only criterion is an @ in 5th position
@P-G-77
@P-G-77 Жыл бұрын
Love it.
@SureshBhardwaj
@SureshBhardwaj 3 жыл бұрын
cooooooooooooooooooooooooool Loved it!
@AtlasMTBRider
@AtlasMTBRider 5 жыл бұрын
I remember solving that very same Crack me with Hopper. thanks for the video, I have not given GHIDRA a try yet. I'm still learning how to pronounce it correctly :)
@micah9382
@micah9382 5 жыл бұрын
It is pronounced "Gee-druh" (github.com/NationalSecurityAgency/ghidra/wiki/Frequently-asked-questions#how-do-you-pronounce-ghidra), but that's okay. This video was a very nice introduction, by the way!
@ThiagoQwertyuiop
@ThiagoQwertyuiop 5 ай бұрын
Thank you!
@OthmanAlikhan
@OthmanAlikhan 3 жыл бұрын
Thanks for the video =)
@und3rgr0undfr34k
@und3rgr0undfr34k 5 жыл бұрын
awesome!
@loremipsum5697
@loremipsum5697 5 жыл бұрын
THANK YOU FOR DOING GOD'S WORK!
@XxManagedxX
@XxManagedxX Жыл бұрын
Excellent video! Is there a way to isolate and tag raw binary into separate chunks? For example if you read an EEPROM and load it in Ghidra as raw binary can you then split it up into prgrogram, data, etc so that decompiler can make sense of it?
@jasonbourne7179
@jasonbourne7179 4 жыл бұрын
Approved for 100k.
@chadiusmaximus9350
@chadiusmaximus9350 5 жыл бұрын
More tutorials please!!!
@kokop1107
@kokop1107 5 жыл бұрын
Great video. But could you make a video comparing Ghidra to IDA or some other RE tools?
@jwdsoft
@jwdsoft 3 жыл бұрын
I hope that you create a beginner series in reverse engineering embedded firmware
@varyktv
@varyktv 4 ай бұрын
Great video! You explain things really simply. One question I have: can you use Ghidra to compare two similar .dll written in C++ files to find the differences between them?
@geocine
@geocine 2 жыл бұрын
are you planning on doing a course series for this? I would buy it
@adnanearrassen6992
@adnanearrassen6992 5 жыл бұрын
nice
@m4heshd
@m4heshd 3 жыл бұрын
What Microsoft did right is "Maximize" and the taskbar.
@pouncerminned863
@pouncerminned863 4 жыл бұрын
Just curious as I just learned that this tool exists, what is difference using this vs ollydbg for cracking? Other than assembly
@olee_7277
@olee_7277 4 жыл бұрын
this tutorial is very jay
@tyrrelldavis9919
@tyrrelldavis9919 4 жыл бұрын
So there are "good" feds? Tell me what the shot is lmao, I'm too bored and see through the veil that most content is staged and fake
@achuthvp5257
@achuthvp5257 4 жыл бұрын
This was a great video. Amazing explanation but if you could speak a little louder and also put in some energy into your voice it would be even better
@joesmith9330
@joesmith9330 5 жыл бұрын
yeaaaaaaaaaaaaaaaaaaaaaaaaaaaa !
@buzifalus
@buzifalus 2 жыл бұрын
Great tutorial, kudos! Can you elaborate why is there an issue requiring the usage of a pointer to a pointer for argv ?
@retrograder3303
@retrograder3303 8 ай бұрын
did you figure out? I am also curious
@promerker1892
@promerker1892 6 ай бұрын
Neat
@calmic9838
@calmic9838 11 ай бұрын
How are you able to run the Unix binary file. Im getting: ```zsh: exec format error: ./rev50_linux64-bit```
@williamsquires3070
@williamsquires3070 4 жыл бұрын
Interesting. When I put the C function prototype for a main() function in, Ghidra wouldn’t even accept “[]”, and I had to use an extra “*” anyway.
@arthurdark3945
@arthurdark3945 9 ай бұрын
You know its a good hacking tool when it uses Windows 95 style GUI.
@urugulu1656
@urugulu1656 5 жыл бұрын
wow your using this sucesfully and i fail at a baby shark singing program (basically a less trivial kinda hello world) lol. actually ghidra seems to hate the function definitions of visual studios stdlib...
@avtem
@avtem Жыл бұрын
Great video! Do you know how to hide the project window? i'd love to hide that window once i ran the code browser
@grover-
@grover- 5 жыл бұрын
Tidy work
@rfeil8443
@rfeil8443 4 жыл бұрын
Could you please make a tutorial on how to skirt the Mac OX Catalina 10.15.8 and download Ghidra? I really want to start using Ghidra but my mac will not allow the Javascript updates ...
@MiserableLemon
@MiserableLemon 5 жыл бұрын
my terminal doesnt allow me to open the crack me initially, you said you're using a VM, is that a different terminal than mac's default?
@twobob
@twobob 3 жыл бұрын
quality
@wintersgrass
@wintersgrass 5 жыл бұрын
Could you do a little tutorial using a MSDOS 16bit binary file? Maybe something that's not packed?
@Xerox482
@Xerox482 3 жыл бұрын
nice but can u show the next step to us like if i have to modify the exe and have to change password from @ to something else how am going to do that . i know there are tons of tuts there but all of them go through asm analysis and not teach exe modification , so will be thankful if u can make detail video on exe modifications
everything is open source if you can reverse engineer (try it RIGHT NOW!)
13:56
Low Level Learning
Рет қаралды 1,3 МЛН
how to install ghidra 11, and JDK.
4:59
Ghidrauto
Рет қаралды 712
Русалка
01:00
История одного вокалиста
Рет қаралды 5 МЛН
Despicable Me Fart Blaster
00:51
_vector_
Рет қаралды 17 МЛН
Дарю Самокат Скейтеру !
00:42
Vlad Samokatchik
Рет қаралды 7 МЛН
Cracking Software with Reverse Engineering 😳
8:01
nang
Рет қаралды 1,6 МЛН
HackadayU: Reverse Engineering with Ghidra Class 1
1:05:06
HACKADAY
Рет қаралды 218 М.
The secrets of Apple Lightning - Part 1
9:45
stacksmashing
Рет қаралды 822 М.
Hacking the Nintendo Game and Watch
9:57
stacksmashing
Рет қаралды 682 М.
Terry Davis' TempleOS Brutal Take Down of Linus Torvalds
28:52
Terry Davis Old Archive
Рет қаралды 902 М.
MMORPG Bot Reverse Engineering and Tracking
9:46
LiveOverflow
Рет қаралды 671 М.
Introduction to Firmware Reversing
11:32
Tony Gambacorta
Рет қаралды 303 М.
Password Cracker with Notepad!
11:41
ebola man
Рет қаралды 482 М.
Русалка
01:00
История одного вокалиста
Рет қаралды 5 МЛН