Reverse Engineering for Beginners: How to Perform Static Analysis on any Piece of Software

  Рет қаралды 45,408

ethicalPap_

ethicalPap_

Күн бұрын

Reverse Engineering 101: How to Perform Static Analysis on any Piece of Software | How to reverse engineer
---------------------------
Learn how to perform static analysis on software with this guide, for beginners, to reverse engineering. This video is perfect for those interested in malware analysis, cyber security, and information technology. Discover key techniques using Cutter, but such techniques can work on any tool, including Ghidra and IDA Pro. Whether you're an IT professional or just intrigued by coding, this video will provide insights into the world of reverse engineering.
--------------------------
Timestamps:
0:00 History of Reverse Engineering
3:40 x86 CPU Architecture
8:29 Register Sets and Data Types
13:31 Decimal, Binary, and Hexidecimal
17:55 Little Endian and Big Endian
21:39 Main Memory (stack)
25:36 Assembly Language x86 Intel
33:02 Dissecting Malware with Static Analysis
54:33 Conclusion
------------------------
Socials:
/ vankperry
Discord: @vipv4
------------------------
Join our community!
/ discord

Пікірлер: 204
@davidblake6889
@davidblake6889 17 күн бұрын
Some of your introduction, including the development of the bombe is incorrect. The original bombe was developed in the early 1930's by the Polish engineers, who along with their plans and personnel were helped to escape from Poland to the UK before the German invasion at the start of WWII. With these people and plans, Alan Turing and Gordon Welchman developed the system much further at the cryptography centre at Bletchley Park in Buckinghamshire in the UK. Much later, their design for the bombe was given to the US Army and Navy to allow them to build their own systems. The bulk of the German radio traffic in Europe was intercepted by both military Y stations and civilian voluntary interceptors (VI's), who were amateur radio operators skilled in receiving morse code in adverse conditions. All of these intercepted messages were decrypted, translated, analysed and disseminated by the personnel based at Bletchley Park.
@ethicalpap
@ethicalpap 17 күн бұрын
@davidblake6889 Thank you for the correction on my history! Pinning this comment for all to see. Grateful to you for taking the time to clarify. This will help me to improve for future videos.
@adrianpad
@adrianpad 17 күн бұрын
who cares. he is delivering engineering gold. not history
@a4d9
@a4d9 15 күн бұрын
@@adrianpad Bill Gates, the current president of the United States of America, invented the computer in 1966 and founded Apple in 1896. Who cares about getting the facts right?
@INDIOBRAVOO
@INDIOBRAVOO 10 күн бұрын
@@adrianpad 🤣
@JuanDuarte_58
@JuanDuarte_58 10 күн бұрын
Good thing the video is about RE and not for a history test.
@celinks123
@celinks123 5 күн бұрын
The best introduction to RE and assembly I have ever watched. Hands down, you know your stuff and have mastered the art of teaching.
@i1abnrk
@i1abnrk Күн бұрын
This is like a full semester course packed into an hour. Well done.
@Thedude897
@Thedude897 Күн бұрын
Oh watched it in slomo Play it at a faster speed..
@pritulkhan1395
@pritulkhan1395 14 сағат бұрын
I am a devops engineer and the algos brought me here. This flew way over my head but I thoroughly enjoyed it
@MelodySparkleroni490
@MelodySparkleroni490 3 күн бұрын
This is an important video. Cybersecurity is an extremely gatekept industry. Respect for covering things others don't want to
@ParhamSalamati
@ParhamSalamati 17 күн бұрын
Best approach on explaining assembly I've seen so far, starting with cpu and ram structure. Great job!
@logyross6883
@logyross6883 13 күн бұрын
I never watched a single reverse engineering video yet the algorithm somehow knew I was interested in this. 🤣 thanks for the video
@tsol438
@tsol438 9 күн бұрын
I was actually trying to find "reverse" connection anydesk. Been watching scambaiters. But I'm also interested in reverse engineering so it was still a win-win. 😀👍
@danielgriffiths5901
@danielgriffiths5901 21 күн бұрын
Looks like you hit the algorithm, just FYI
@Sadigziggi
@Sadigziggi 10 күн бұрын
Yep
@Bbcsupremacy
@Bbcsupremacy 10 күн бұрын
Yep
@bekone
@bekone 9 күн бұрын
Yep
@tristancole8158
@tristancole8158 9 күн бұрын
Sit down, son, and let The Beard teach you some cryptography.
@Mandil
@Mandil 9 күн бұрын
I love it when I can be part of something
@gravy1770
@gravy1770 8 күн бұрын
All it took was the title and video length for me to know I had to watch this. Very much to the point. Loved every second
@ninthjake
@ninthjake 18 күн бұрын
The effort put into this video is visible and the quality is insane. Very well presented and explained. Bravo!
@sense.enjoyer
@sense.enjoyer 21 күн бұрын
Been watching your channel and I've just barely realized how slept on you are. Considering the quality of your videos I had thought you already had thousands of subs and much more views. This channel is going to blow up--considering the impending explosion of cybersecurity careers in line with AI/ML advances--its only up from here man!
@AKKJ420
@AKKJ420 Күн бұрын
Great video. For some reason I don't see a "main" function my file. Please dont stop making videos you are naturally born teacher. Many thanks
@mikele384
@mikele384 20 күн бұрын
this video will skyrocket...
@Gh0stwrter
@Gh0stwrter 2 күн бұрын
Thanks for the great tutorial!! I really like how you explained the stack with the main function. As a programmer this made a lot of sense and helped me understand something I've been trying to wrap my mind around in lower level programming like Rust
@xCheddarB0b42x
@xCheddarB0b42x 19 күн бұрын
I have been looking for a decent architecture primer, and here one is. Thank you! Subbed.
@Jasonspring74
@Jasonspring74 19 күн бұрын
Man, you're so good, I've always thought of cybersecurity as a whole is complex and hard, don't get me wrong , it still is hard for me 😂, but the way you teach things , the way you explain , I could relate to it even as a complete beginner, keep going mate 🙌, and also the intro of this video is a banger, sick editing, I ain't even lying you're gonna pop off, this video already did pop off, Keep the videos coming, Just wanted to let you know that you're video are super helpful.❤
@christianroy1071
@christianroy1071 20 күн бұрын
As a mechanical engineer this is not the type of reverse engineering nor the kind of static analysis I was expecting.
@AJ5
@AJ5 16 сағат бұрын
Yeah me too, LOL. I haven't watched the video yet but I doubt "static" will be anything close to the shitstorm we had to study
@cody_code
@cody_code 16 күн бұрын
A part 2 would be awesome man, thanks for making this!
@Tofarglobal
@Tofarglobal 20 күн бұрын
Can't wait for a part 2
@BrianThomas
@BrianThomas 6 күн бұрын
I love tech hands down, but for some reason I just don't like cyber security. My interest in it was always very low, but for some reason you've captured my attention. I found myself losing track of time while watching these videos. Thank you my friend. It looks like you've sparked something that I didn't even know was there.
@DIYSEC
@DIYSEC 20 күн бұрын
Thanks for taking the time to make this video, Man it was great.(Definitely look forward to any additional videos on this topic) I think it would lead good into buffer overflow explanations for a future video. Js de-obfuscation maybe ? 🎉Just keeping the ideas rolling for yah .
@ethicalpap
@ethicalpap 20 күн бұрын
That's a very good idea 🤔
@greatwolf.
@greatwolf. 19 күн бұрын
49:08 quick note, In the context of C and C++, a reserve parameter is put in there by whoever designed it so they can later modify it or extend it with other functionality, eg. like in a later version. Same concept but in something unrelated, you see this sometimes in forum threads. An announcement thread is made and sometimes the original poster of that thread would make 1 or 2 extra empty message post below the first so they have space to add extra stuff later if they need.
@ethicalpap
@ethicalpap 18 күн бұрын
Thank you!
@MichaelSmith-lm5sl
@MichaelSmith-lm5sl 14 күн бұрын
The idea of a "reserved parameter" in C and C++ isn't typically about leaving parameters empty for future use. Instead, designers sometimes add additional parameters to functions (often with default values) to ensure future compatibility and extend functionality without changing the function's signature in a breaking way. In C++, this is more commonly handled through method overloading, default parameters, or using variadic templates, rather than reserving parameters. As for the analogy with forum threads, it's not quite the same. In programming, leaving room for future changes needs careful planning to ensure backward compatibility and maintainability, while reserving posts in forums is a straightforward way to manage content updates. To sum up, in professional C/C++ development, future-proofing involves careful design patterns rather than just "reserving" parameters.
@aleksandrbazhin
@aleksandrbazhin 9 сағат бұрын
@@ethicalpap Also about that function - I think the params are retrieved from the stack in the reverse order, so the reserved is 0, and the URL is known - it's some .ico file that's being copied into some .exe
@arizvisa
@arizvisa 5 күн бұрын
It makes me happy seeing more people interested in RE in general. RE is a skill that's very similar to learning a language. You practice familiarity until you develop fluency. A lot of the regular RE communities are super-quiet with individuals that are very temporary, looking for a quick answer when there is none. It makes it very difficult to hire people, instead forcing companies to search for people who're passionate, and then training them up to speed.
@MissionSilo
@MissionSilo 4 күн бұрын
Are there degrees or courses on it?
@arizvisa
@arizvisa 4 күн бұрын
@@MissionSilo I don't know of any offhand, but i'm sure there are (although I can't personally vouch for their quality, since some could just be money grabs recycling prior-written content). There are, however, different "types" of reverse engineering which warrant different types of approaches towards comprehension... each result in refining your skills differently. So, it's worth considering what your long term goal is so that you can focus on familiarity within the field you're interested in (and discover courses that cater towards those goals). Generally, though, RE is originally rooted in interoperability, so if you're a good enough developer with the ability to run a debugger to confirm your theories, you get basic algorithmic familiarity for free and can use that as a base to get better. The tools that reverse engineers use and regular engineers use overlap in many ways. Despite this, there's many ways to develop a skill.
@MissionSilo
@MissionSilo 4 күн бұрын
@arizvisa yeah there is software RE then hardware?
@arizvisa
@arizvisa 4 күн бұрын
@@MissionSilo Hardware, Software (Interoperability/IP-theft, Malware, Vulnerabilities)...Each develops different skills. Reversing malware is almost completely different from vulnerability research, but then Interop (in some cases) can be considered part of Vulns. Then there's variations on both of those if you focus on low-level things where it involves Userspace, Kernelspace, etc. These also extend to different platforms/languages which have different patterns for you to recognize (although, they all follow the same basic rules). Some JS deobfuscation can also be considered RE. That's why knowing which field you are actually interested in is important.
@MissionSilo
@MissionSilo 4 күн бұрын
@@arizvisa so general engineering for being able to do anything in RE?
@ret2libc0x90
@ret2libc0x90 15 күн бұрын
Highly underrated channel, I know you will pop off soon.
@Gaurav_Kandpal
@Gaurav_Kandpal 9 күн бұрын
Thanks for dropping the video. Want part 2 of this. A dynamic analysis would be great.
@volatuscorvus621
@volatuscorvus621 17 күн бұрын
please continue this and get into more advance stuff eventually!! you are great
@josiahdada3727
@josiahdada3727 7 күн бұрын
I would definitely love a part 2
@eminulastimurtas2723
@eminulastimurtas2723 5 күн бұрын
you're amazing bro, you answered almost all the questions I had about getting started. Lot's of love from Turkey!!
@andreww2319
@andreww2319 3 күн бұрын
Very cool. Thank you.
@TheResearchEngineer
@TheResearchEngineer 16 күн бұрын
I know ASM but this was very pleasing to listen to while doing work around the house and general cleaning. Definitely subscribed to your channel. You’ve got a great format going on your videos. Keep it up, I see 25k+ by the end of the year.
@helloworlditsworld
@helloworlditsworld 18 күн бұрын
This is amazing I’m glad I found your channel
@tylerfarrell8748
@tylerfarrell8748 3 сағат бұрын
Great Video! Keep it up. Subscribed!
@0ADVISOR0
@0ADVISOR0 18 күн бұрын
I love it, new Sub! Please make Part 2,3,4 and 100!
@JerryThings
@JerryThings 18 күн бұрын
Thank you for making this video, I hope future RE enthusiasts will see this one, it's gold! I learned asm by myself a few years ago, and never knew about the lore of big-little endian lol
@felipetavares2445
@felipetavares2445 3 күн бұрын
Excellent!
@otisbrown420
@otisbrown420 4 күн бұрын
Thanks you my brother for more to learn about..
@straightface311
@straightface311 12 күн бұрын
This was very informational and well explained. Thanks for this!
@milanguzvic8457
@milanguzvic8457 21 күн бұрын
Excellent video brother, I stumbled upon your channel and had to subscribe :)
@turnoff7572
@turnoff7572 Күн бұрын
Looks like a great video glad it got recommended to me, I'm procrastinating like crazy but wana start learning. i saved it watch later please someone remind me
@N.BinZahar
@N.BinZahar 15 күн бұрын
I like the way you explain. Thanks
@Symbiont_One
@Symbiont_One 18 күн бұрын
Gonna have to make another cup of coffee to take in all this information Great work bro. 👍
@sabyasachisahoo8975
@sabyasachisahoo8975 13 күн бұрын
Thanks for making this kind of awesome video ,please upload the 2nd part
@jwjbadger7261
@jwjbadger7261 18 күн бұрын
You are incredible thank you
@waynegreen7970
@waynegreen7970 8 күн бұрын
Good content!
@FullMetalAlchemist777
@FullMetalAlchemist777 19 күн бұрын
Great content, very interesting, as we say in France : Merci beaucoup :)
@WilfredMacaulay-e4c
@WilfredMacaulay-e4c 19 күн бұрын
Yay... 600th subscriber!
@ellisfrancisfarros3935
@ellisfrancisfarros3935 20 күн бұрын
Thanks! This will be helpful for me as a normie.
@uzumakiuchiha7678
@uzumakiuchiha7678 12 күн бұрын
make this is playlist please. It was nice, improved my understanding
@4sakenGol3m
@4sakenGol3m 9 күн бұрын
I loved the video! Can we get a part two?
@valshaped
@valshaped 14 күн бұрын
It's an Arithmetic/Logic Unit, it performs arithmetic (+, -, *, /, %, etc.) and logic (&, |, ^, etc.) operations
@michaziomek
@michaziomek 18 күн бұрын
You got the history wrong. The poles were Marian Rejewski, Jerzy Różycki and Henryk Zygalski. Turing built a computer on top of it.
@DailyFrankPeter
@DailyFrankPeter 15 күн бұрын
Shame they cut the poles out of the movie.
@michaziomek
@michaziomek 15 күн бұрын
@@DailyFrankPeter jus as they blamed the cluster feck of operation Market Garden on the Polish general because they did not want to offend the americans who messed it up on the first place
@cralx2k
@cralx2k 15 күн бұрын
Thank You
@raghuraghav6636
@raghuraghav6636 18 күн бұрын
Really thanks for simple the explanation man. Please create a proper standard for reverse engineering with a proper series and come fast with part 2 brother.
@uzumakiuchiha7678
@uzumakiuchiha7678 12 күн бұрын
I would very much like a part 2. PLEASE MAKE a PART 2
@midas6659
@midas6659 13 күн бұрын
Subscribed ✊🏾
@MissionSilo
@MissionSilo 4 күн бұрын
This what i find interesting
@andydataguy
@andydataguy 16 күн бұрын
Brother your channel is criminally undersubscribed
@loldoctor
@loldoctor 19 күн бұрын
The algorithm has favored you (and me!)
@GOLD33N13
@GOLD33N13 20 күн бұрын
AMAZINGGGGGGGGGGG!
@RandomNoob1124
@RandomNoob1124 9 күн бұрын
Got to support my yaad man brother engineers 🙏🏾💯
@ermyril
@ermyril 17 күн бұрын
Dude, your channel is like a dream come true, I always wanted to understand reversing because for me it still feels like some magic
@MorningNapalm
@MorningNapalm 18 күн бұрын
Seems like a really interesting video, and if an ARM version is ever made, I will be back to watch the full series, but to be honest, x86 assembler makes me projectile-vomit every time I see it, so for now I am bowing out. I am leaving a like, in the hope it encourages you to do more.
@UncivilisedSavage
@UncivilisedSavage 11 күн бұрын
Liked ✅ Commented ✅ Subscribed ✅ Part 2 .........loading
@ashtreylil1
@ashtreylil1 10 күн бұрын
You are getting boosted by yhe algorithm 🤓
@shaggygoat
@shaggygoat 18 күн бұрын
If we wrote right-to-left (best for right-handers with clay tablets so they can see the approaching margin) and used our usual Hindu-Arabic numbers, or instead wrote left-to-right (best for right-handers with ink so they more easily avoid smudging wet ink) and wrote numbers with the smallest place values first, we would all be using Little Endian machines, and multi-byte numbers in hex dumps of any byte multiple units, bit numbering and bitmapped graphics pixel addressing would be rather consistent and intuitive. 😀
@cosmicgz11
@cosmicgz11 6 күн бұрын
Hey great video. Awesome learning experience. Can you lay some pointers on how you prepared for the video - i mean the layout of content, 1. what to discuss/explain first and how much to say on what topic then going on to next 2. the scripting balance with facts, teaching, engagement, fun 3. what technology (app, device) you're using. Thank you!
@ethicalpap
@ethicalpap 6 күн бұрын
Absolutely, ping me on one of my socials in the description and I can walk through my process, although it's changed since this video.
@AcroPhat
@AcroPhat 18 күн бұрын
Like, comment, and subscribe folks! Keep the algorithm working as it's supposed to!
@aster5031
@aster5031 13 күн бұрын
10/10
@slovakthrowback3738
@slovakthrowback3738 13 күн бұрын
Hey, I appriciate you and this video but I think that you would really benefit from a little bit more of a rigid script as it's kinda natural for us humans to kinda wander and dilly dally which can make the information pretty hard to understand. I get it takes a lot of time and effort so its selfish of me to ask that of you, but I'd personally recommend you try and make a more "combed" video as it makes for a much more engaging and informative video. Either way cheers, I learned a bit
@edcdecl
@edcdecl 11 күн бұрын
do you have any advice on reverse engineering a 16-bit program for ms-dos that uses overlays?
@Stancehall
@Stancehall 9 күн бұрын
Algorithm sent me. Subbed
@anime_erotika585
@anime_erotika585 17 күн бұрын
only Alan Turing and Bombe was from Britan, his machine was based(but only a little actually) on a polish machine "bomba" which is bomb in polish P.S. The rest of the video is cool btw P.S.S. Also at the time bombe was made, poland was entirly capitulated so there was no way for it to make anything
@ethicalpap
@ethicalpap 17 күн бұрын
@anime_erotika585 grateful thankful for you, to take the time to correct me. Very much appreciated!
@miguelmalvina5200
@miguelmalvina5200 20 күн бұрын
I hope people can apply this knowledge into modding games
@matthewgill7069
@matthewgill7069 20 күн бұрын
I can't tell you the number of times I've been in the middle of some random CTFTime event and realize I've been stuck on the same "easy" rev problem for 8 hours...
@zuberkariye2299
@zuberkariye2299 9 күн бұрын
I love seeing black in tech/IT/Cybersecurity, keep up the great work, brother!
@theprofessor5584
@theprofessor5584 8 күн бұрын
Well said, we need a lot more channels like this. Hope he makes lots of videos, nothing challenges true bigotry than self evidential brilliance. You can argue all day and night with racists and bigots, but you get few of these videos and they cant say anything, not that most racists would understand this level of thought lol. Keep going man, your videos make people proud to see good vibes instead of the constant negative reinforcement forced on ALL of us by the entertainment industry, hope more people of color in general get into these awesome creative vlogs regardless of profession.
@MrSomethingdark
@MrSomethingdark 6 күн бұрын
sure okay but I come here because Pap is knowledgeable, well spoken and has good ideas. What does it matter if the person speaks coherently, clearly and teaches me something. Don't force people to do something they don't want to. I am sure Pap is where he is bc of his work, effort and belief in himself. Keep it up Pap.
@sweaty8717
@sweaty8717 5 күн бұрын
​@@theprofessor5584stop making it weird bro
@agxryt
@agxryt 5 күн бұрын
​@@MrSomethingdarkwhat
@adrianpad
@adrianpad 17 күн бұрын
Instant subscription to your channel. I can't remember another instance in which I subscribe from the first video I watch. Thanks for your time doing this bro. MVP
@Tofarglobal
@Tofarglobal 20 күн бұрын
In the 39.39 minute of the video when you were explain the code: [ mov ctp, csp ] You said it will move from ctp to csp, I thought you said in the earlier part of the video that x86 uses little- endian so shouldn't the csp rather move to ctp?
@ethicalpap
@ethicalpap 20 күн бұрын
Yes you are correct, I mixed up my words there. Thank you for pointing that out.
@Tofarglobal
@Tofarglobal 20 күн бұрын
@@ethicalpap no prob😅, thanks for the video man
@sparthir
@sparthir 19 күн бұрын
This is so beyond me but I love the geeky nerdery of it. :)
@MichaelSmith-lm5sl
@MichaelSmith-lm5sl 14 күн бұрын
Here are the highlights from the video "Reverse Engineering for Beginners: How to Perform Static Analysis on any Piece of Software" along with suggested improvements for each section: ### Highlights and Suggested Improvements 1. **Introduction to Reverse Engineering** - **Highlight**: The video starts by explaining what reverse engineering is and its importance in understanding and recreating software. - **Improvement**: Include a brief overview of the ethical and legal considerations involved in reverse engineering to provide viewers with a comprehensive understanding of the practice. 2. **Static Analysis Basics** - **Highlight**: Introduction to static analysis and its role in reverse engineering, including looking at assembly code and understanding how a program works without executing it. - **Improvement**: Provide a more detailed explanation of the differences between static and dynamic analysis, and when to use each method effectively. 3. **Tools and Setup** - **Highlight**: The video mentions using Cutter as a disassembler and debugger for static analysis. - **Improvement**: Offer a comparison of different tools available for static analysis (e.g., IDA Pro, Ghidra, Radare2) and explain the pros and cons of each, helping viewers choose the best tool for their needs. 4. **Example Analysis** - **Highlight**: Walkthrough of a specific example, showing how to analyze assembly code, understand function calls, and identify important instructions. - **Improvement**: Use multiple examples of varying complexity to show how different types of software and malware can be approached. This can help viewers understand the broader applicability of the techniques discussed. 5. **Combining Static and Dynamic Analysis** - **Highlight**: Brief mention of combining static analysis with dynamic analysis to get a complete picture of how the software operates. - **Improvement**: Provide a detailed example of how to integrate dynamic analysis tools (e.g., using a debugger to monitor runtime behavior) and explain how this combined approach can help uncover more details about the software. 6. **Decompilation** - **Highlight**: Discussion on using decompilers to convert assembly code back into higher-level code for easier understanding. - **Improvement**: Explain the limitations and challenges of decompilation, such as issues with obfuscation or incomplete decompilation, and offer tips on how to deal with these challenges. 7. **Practical Applications** - **Highlight**: Mention of practical applications like malware analysis, bug bounty hunting, and understanding proprietary software. - **Improvement**: Include real-world case studies or success stories to illustrate how reverse engineering has been effectively used in these areas, providing concrete examples of its benefits. 8. **Avoiding Common Pitfalls** - **Highlight**: The video briefly touches on avoiding certain common mistakes in reverse engineering. - **Improvement**: Expand this section to include a comprehensive list of common pitfalls and detailed strategies for avoiding them, ensuring that beginners can navigate the process more smoothly. 9. **Continued Learning and Resources** - **Highlight**: Encouragement to continue learning and exploring the field of reverse engineering. - **Improvement**: Provide a list of recommended books, courses, forums, and online resources where viewers can deepen their knowledge and connect with the reverse engineering community. 10. **Interactive Elements** - **Highlight**: Engaging and clear presentation style that makes complex topics accessible. - **Improvement**: Incorporate interactive elements such as quizzes, hands-on exercises, and downloadable sample code to reinforce learning and provide practical experience. By incorporating these improvements, the video can offer a more comprehensive, practical, and user-friendly guide to reverse engineering, catering to both beginners and those looking to deepen their expertise.
@graphicdesignandwebsolutio365
@graphicdesignandwebsolutio365 18 күн бұрын
So glad we have some autochthons spreading knowledge
@oglothenerd
@oglothenerd 17 күн бұрын
This is a really good informative video! Nice work!
@F3f33f
@F3f33f 18 күн бұрын
You have a knack for this. Keep it up!
@complexity5545
@complexity5545 11 күн бұрын
I never heard of this guy and he pops up in my feed. The youtube gods are smiling down on you. I'm an expert -- you might need to track your statistics, and maybe gear up to grab your growth spurt audience. Good stuff -- especially for newbies into the fields of programming.
@Nezorinos
@Nezorinos 5 күн бұрын
Please correct me if I'm wrong, since it's LE then for the URLDownloadToFile the szURL parameter is the 2nd from the bottom in the stack. Talking about the 48:12 explanation. Loved the video please do more.
@ethicalpap
@ethicalpap 5 күн бұрын
Correct! It should have been LE, I used BE which was backwards, but somehow the video still worked out without me noticing the mistake... ty :)
@zhexymusic
@zhexymusic 18 күн бұрын
Very good video 😊 I can only add that maybe you should make gate release slightly longer, as voice cut is very pronounced. Maybe 300-500ms would help 😉
@ethicalpap
@ethicalpap 18 күн бұрын
@@zhexymusic good suggestion!
@dada-by3sc
@dada-by3sc 13 күн бұрын
thanks for dis m8, ill look into it later
@attribute-4677
@attribute-4677 5 күн бұрын
Would love to see an x64 vs 32 bits. The registers definitely behave differently
@Eso233
@Eso233 18 күн бұрын
Im using your video for internal training of our team! The animations are great, I would work on delivery. Thanks for this content!
@aprilfoola
@aprilfoola 17 күн бұрын
pap hitting my fyp
@twiggygarcia5096
@twiggygarcia5096 6 күн бұрын
is it possible to reverse engineer a Solana program?
@daxramdac7194
@daxramdac7194 19 күн бұрын
Wow I was recommended a video on an advanced computer topic thats not 8 minutes, but actually seems long enough to warrant such a theme? Nice! Im only a couple minutes in, but seems like its off to a great start.
@RAZREXE
@RAZREXE 13 күн бұрын
The KZfaq recommendations algo working as it should, finally. Amazing content ❤
@linodexplod1575
@linodexplod1575 2 күн бұрын
Is it possible to use real visualizations to help understand?
@Lets_DoWhatWeWant
@Lets_DoWhatWeWant 3 күн бұрын
When Yuli gets back.
@pengindoramu
@pengindoramu 17 күн бұрын
@16:40, some of the text is offscreen
@kevinrineer5356
@kevinrineer5356 19 күн бұрын
Algorithm brought me here. The subscribe button will keep me
@Kurtsi
@Kurtsi 15 күн бұрын
At 47:55 while you are explaining the URLDownloafToFileW function, are you accidentally using incorrect endianess? You noticed that the reserved parameter (4th push) is not zero while you should have used 2nd push which was indeed 0. Great video by the way!
@ethicalpap
@ethicalpap 15 күн бұрын
I hadn't even realized that I used big endiannes there. Thanks! Looks like It still worked out
@Sbrabson04
@Sbrabson04 8 күн бұрын
James Harden has discovered engineering
@hatman-rc2vc
@hatman-rc2vc 12 күн бұрын
very good, i would have never expected to see the day bob marley came back to life to finally teach me reverse engineering.
@ux7188
@ux7188 17 күн бұрын
A +++
OAuth (part 1): A Beginner-level Deep Dive for Hackers
33:08
ethicalPap_
Рет қаралды 1,4 М.
That's Not How the Golden Ratio Works
31:15
Another Roof
Рет қаралды 19 М.
Самый Молодой Актёр Без Оскара 😂
00:13
Глеб Рандалайнен
Рет қаралды 12 МЛН
Пранк пошел не по плану…🥲
00:59
Саша Квашеная
Рет қаралды 6 МЛН
Harder Drive: Hard drives we didn't want or need
36:47
suckerpinch
Рет қаралды 1,6 МЛН
Nature's Incredible ROTATING MOTOR (It’s Electric!) - Smarter Every Day 300
29:37
How a CPU Instruction Decoder and Instruction Execution Works
14:21
How Hackers Bypass Kernel Anti Cheat
19:38
Ryscu
Рет қаралды 588 М.
What is the Smallest Possible .EXE?
17:57
Inkbox
Рет қаралды 318 М.
Andrew Kelley   Practical Data Oriented Design (DoD)
46:40
ChimiChanga
Рет қаралды 53 М.
The Reason Train Design Changed After 1948
13:05
Joe Scott
Рет қаралды 103 М.
One second to compute the largest Fibonacci number I can
25:55
Sheafification of G
Рет қаралды 180 М.
Самый Молодой Актёр Без Оскара 😂
00:13
Глеб Рандалайнен
Рет қаралды 12 МЛН