No video

Reverse engineering with

  Рет қаралды 111,788

stacksmashing

stacksmashing

Күн бұрын

Пікірлер: 186
@biodevm
@biodevm 5 жыл бұрын
"You should definitely make a video about reverse engineering basics"
@m_fadhln
@m_fadhln 4 жыл бұрын
yes
@Rhidayah
@Rhidayah 2 жыл бұрын
It's been awhile
@loremipsum5697
@loremipsum5697 5 жыл бұрын
Very impressed by the quality of the tutorial.Clear, concice, straight to the point how I like em'. Ghidra truly is a powerful tool but once again in the hands of a capable person it is even better. Also, that encrypted firmware had no chance at all, when the key and the booty is in the hand of the attacker it's only a matter of time! No amount of obfuscation can change that simple fact.
@JohnAlanWoods
@JohnAlanWoods 5 жыл бұрын
What is a better way to do this? Clearly not having the key inside the bin, what's better practice?
@AcheronLupus1
@AcheronLupus1 5 жыл бұрын
@@JohnAlanWoods Don't bother encrypting anything that's entirely controlled by an attacker- it's just obfuscation. You could use some sort of online method of getting the key from a central server, but even then it wouldn't be perfect.
@thegame4027
@thegame4027 5 жыл бұрын
@@JohnAlanWoods In this case the correct solution would have been to have the key inside the device in some place that does not get overwritten by a firmware upgrade. That way you don't have to ship the decryption key with new firmware. They are just idiots.
@tyrrelldavis9919
@tyrrelldavis9919 4 жыл бұрын
Govlarp and anon tuts are better than commercial shill tuts , For my normie web programming stuff, all we have are commercial shills and they are insufferable. Wish we had guys like this for my normie web programming tutorials. I remember the era before commercial shills, the tutorials were actually of a higher quality , like this one. Luckily commercial shills don't affect govlarp or other cool people , they only affect the normie programming world where I come from. U guys are lucky , you don't have to second guess if your tutorials are made by a grifter, The worst are those beginner JavaScript and PHP, which basically give people insecure info and get their sites hacked, I wish the normie commercial programmers would fix their tutorials when they advocate for insecure methods, Once again , u guys are lucky to have a higher caliber of material in general. In normie non govlarp programming , this would be 5 hours long and the video bar would be yellow covered with ads, and some guy advertising his shi**y udemy courses. Tl;Dr the world of normie programming has been watered down by commercial shills These tutorials are of a much higher quality than what we get Bet this guy would be great at teaching dumb people like me their normie web programming, even though it's probably way beneath their skill level. Also in the normie world, they compartmentalize stuff so nobody knows what it actually is, they just fill that space with obfuscation and buzzwords Ironic, the normie programming world is the compartmentalized one While the govlarp one(these tutorials) is clear and concise You'd think it'd be the other way around I'm too dumb to do this kind of stuff, I know IDA a bit but not much.
@tunahankaratay1523
@tunahankaratay1523 3 жыл бұрын
@@thegame4027 That too only takes one person with electronical hacking knowledge. The worst part is that once the key gets shared online, you cannot change it because it is hard coded in all devices.
@nxxxxzn
@nxxxxzn 5 жыл бұрын
This video is PAAACKED with great info. Keep them coming!
@recklessroges
@recklessroges 5 жыл бұрын
Its nice to see some real hacking being done by someone that is good at it. You are also a really good teacher; clear and well paced, showing your mastery of the subject.
@andersp8081
@andersp8081 5 жыл бұрын
The AES functions in the library does not use padding. So when running openssl from command line you have to use ”-nopad” to get the last 16 bytes (and avoid the error message). Your key is also two zero bytes too short ”0000” (from the python script), but openssl will pad the key with zero bytes so it works anyway.
@MrMasterRhythm
@MrMasterRhythm 5 жыл бұрын
I'll in love with your channel! Please create a series of Reverse Engineering Basics!
@RmFrZQ
@RmFrZQ 5 жыл бұрын
It was very interesting to watch the workflow and what programs were used to achieve the final goal. I'm looking to get back into reversing, but I became too rusty and there is a ton of new programs, tools and techniques that I know nothing about. I remember having fun with MSVS6, Cracker's Kit and OllyDbg on Windows XP. Those days seems so distant now..
@DashieDasher
@DashieDasher 5 жыл бұрын
Amazing! I'm happy to see some comprehensive coverage of Ghidra. This is packed full of useful information for Ghidra. Being familiar with reversing only gets you so far with a given program.
@goosenp
@goosenp 5 жыл бұрын
Wow, this tutorial is of amazing quality! Since Ghidra is quite a new tool, it is quite difficult to find resources on it, so you're really doing the community an amazing service. This video made me subscribe. I'm having trouble finding a resource on how to using Ghidra for embedded firmware which isn't unix based. (No MMU, just bare metal firmware) Liveoverflow did quite an interesting series on the STM32-based legder wallet, could you please point me to a resource on analysing the same type of embedded device with Ghidra?
@subschallenge-nh4xp
@subschallenge-nh4xp 5 жыл бұрын
hi from liveoverflow ,which new tool do you know so far ,i need more knoledge
@usopenplayer
@usopenplayer 5 жыл бұрын
Many thanks to Ghidra Ninja and the NSA!
@georgensa3942
@georgensa3942 5 жыл бұрын
this is love dude... you are awesome just keep them coming Hope you explain some router firmware reversing and explaination for how these hackers are now exploiting the routers on a very large scale. Thnaks in advance :)
@santasl
@santasl 5 жыл бұрын
Very helpful video. I now see why my previous attempts understand reverse engineering were bound to fail. My way of approaching such a problem where not because I have only limit knowledge about x86 assembler - although that probably doesnt help either - it was more a misunderstanding of how to use the decompilation view. Thanks for this video, and I'm looking forward to the next videos
@carlosdiaz4535
@carlosdiaz4535 5 жыл бұрын
For a moment I thought you are the presenter of SCADA: Gateway to shell from a CCC talk. Impressive work and video quality!
@stacksmashing
@stacksmashing 5 жыл бұрын
🤫Thank you!
@keyaedisa2
@keyaedisa2 Жыл бұрын
i watched this video after your how to use ghidra for the crack me video and i can now say i have a much greater understanding of how ghidra works. i had given up on crackme's but i can now finally attempt one with confidence. thank you so much seriously
@reallostinmyway
@reallostinmyway 5 жыл бұрын
Dude, please uploads more videos, you cannot imagine how we appreciate your videos. Thank you very much
@dummybugstudios6450
@dummybugstudios6450 3 жыл бұрын
I'm here from LiveOverflow's channel and I'm loving your content. Please make more of this stuff! :D
@stacksmashing
@stacksmashing 3 жыл бұрын
Welcome on board 😀
@diegoporras7769
@diegoporras7769 5 ай бұрын
808 seconds of pure gold. No one sec wasted ❤
@RockfordRoe
@RockfordRoe 4 жыл бұрын
I'm a APCSA student with no experience with reverse engineering, this sounds like something very fun I can do and learn while quarantined.
@MrRage79
@MrRage79 5 жыл бұрын
Great Work here! Hope there will come more in the future! Very good explained and ez to follow.
@MrRage79
@MrRage79 5 жыл бұрын
Also a short question: Your accent sounds familiar to me. Are you from germany? If i'm right: Schöne Grüße aus Bayern! Sehr gut erklärte Videos, denen auch sicher Leute folgen könnten, die bis jetzt noch kaum etwas in die Richtung gemacht haben. Hoffe da kommen noch ein paar mehr Videos! Was bringt mir all mein Wissen, wenn ich es nicht verständlich äußern kann. Wirklich gut ist man erst in einem Thema, wenn man die komplexeren Vorgänge simpel erklären kann. Und das kannst du auf jeden Fall! And maybe you could start a Discordserver for your followers. That would help to build a community:) @Ghidra Ninja
@TheJuli1241
@TheJuli1241 5 жыл бұрын
Id die to watch a reverse engineering basics tutorial. I was hooked just by watching for 2 minutes
@andrewshatnyy
@andrewshatnyy 3 жыл бұрын
Unbelievable quality of the content. Massive thanks, mate!
@LiEnby
@LiEnby 5 жыл бұрын
Lol now you can aes-ecb-encrypt and make a custom firmware
@mitfreundlichengrussen1234
@mitfreundlichengrussen1234 5 жыл бұрын
wow - perfect example of a very skilled knowledge/intension mix. Thx for the work and sharing.
@Mammetun
@Mammetun 5 жыл бұрын
Excellent video and great channel!! Thank you for sharing your knowledge with us who are not yet experts in this matters. Golden things to learn here :)
@Mr.Leeroy
@Mr.Leeroy 5 жыл бұрын
damn tools are horrifyingly powerful nowadays.
@chrs-wltrs
@chrs-wltrs 3 жыл бұрын
I came to crack software, stayed for the full tutorial series. Really great stuff.
@Fictionman91
@Fictionman91 5 жыл бұрын
I love your work! Nice and easy to understand. I looking forward your future videos.
@jakobcranium148
@jakobcranium148 5 жыл бұрын
This video is great. Alongside LiveOverflow one of the best RE videos on KZfaq! Keep them coming.
@ollopa1
@ollopa1 5 жыл бұрын
This is really helpful for understanding the Ghidra workflow. Thanks!
@kosmasraptis8374
@kosmasraptis8374 2 жыл бұрын
This guy deserves more recognition! Extremely skilled! Subbed!
@Bits32
@Bits32 4 жыл бұрын
That's really impressive. Thank you for walking us through.
@TheSurvivor4
@TheSurvivor4 3 жыл бұрын
Amazing video. You make it easy to follow by being precise, and "answering" questions that may pop up as I watch it. Your videos are really packed with great information. I learned a lot. Thank you.
@fatihgul77
@fatihgul77 5 жыл бұрын
Your videos are really very good. Thank you for them and please continue for new ones 👍🏻
@DonQuichotteLiberia
@DonQuichotteLiberia 3 жыл бұрын
The entropy of this video is enormous, I can see that without running binwalk -E.
@dumle29
@dumle29 3 жыл бұрын
You're saying it's very random? :P
@iforce2d
@iforce2d Жыл бұрын
Wow, what an eye-opener!
@yottaforce
@yottaforce 5 жыл бұрын
So glad I took the extra effort to put in security from the beginning in the firmware update system I've designed.
@hishamhaneefa7753
@hishamhaneefa7753 2 жыл бұрын
Your seeing now is a master at work🔥🔥🔥
@timecop1983Two
@timecop1983Two 5 ай бұрын
Finally someone is doing it on a physical device!!!
@BillEngwall
@BillEngwall 3 жыл бұрын
Gateway to shell :D Good job Thomas, love the work you put in!! Sorry a bit late :(
@Jabdy86
@Jabdy86 5 жыл бұрын
Awesome, love the information. Your channel is great, hoping to see more of these in the future.
@evidencemonday5948
@evidencemonday5948 4 жыл бұрын
Wonderful video. From what I see you've spent a great deal of time studying the firmware. Some basics on how you go about reverse engineering would be really helpful. Thanks.
@nameistunbekannt7896
@nameistunbekannt7896 5 жыл бұрын
Insider here: We know that the encryption is very basic and rather embarassing. We don't want to make it too easy, but we also know that even the "hardest encryption" will be cracked if enough time is invested. So this is the middle way.. Nice video, thanks for the tips!
@kartoffelwaffel
@kartoffelwaffel 5 жыл бұрын
Embedded engineer here, you guys hiring?
@nameistunbekannt7896
@nameistunbekannt7896 5 жыл бұрын
@@kartoffelwaffel This is an anonymous account, sorry.
@kartoffelwaffel
@kartoffelwaffel 5 жыл бұрын
@@nameistunbekannt7896 As implied by your name, no worries!
@S00mbre
@S00mbre 5 жыл бұрын
Can't wait to see more of your Ghidra videos!
@221Gregor
@221Gregor 5 жыл бұрын
Quality of the video is excellent!
@rafsanuddinbegrizan8090
@rafsanuddinbegrizan8090 5 жыл бұрын
You should make more video man. Love your video
@william5341
@william5341 5 жыл бұрын
This video was so good, very well explained
@stevenaathan4894
@stevenaathan4894 5 жыл бұрын
awesome video, really loved it. I'm very excited about the upcoming post on finding a vuln in the device.
@billigerfusel
@billigerfusel 5 жыл бұрын
Best video I’ve seen all week.
@i_am_ur_manager7673
@i_am_ur_manager7673 3 жыл бұрын
So clean, so cool i love this video !
@ashokvj8342
@ashokvj8342 5 жыл бұрын
Bro awsm video i have became a huge fan of youu you have got the skills man
@ThePandaGuitar
@ThePandaGuitar 5 жыл бұрын
Wow! Thank you so much for such high quality video. Subscribed! Please keep going.
@justforyoutube1319
@justforyoutube1319 5 жыл бұрын
this is a high level of reverse engineering ! like + subscribe
@abdallahhadjallah1465
@abdallahhadjallah1465 5 жыл бұрын
Wow it was so great,i am really fascinated by your method, i hope that soon as you can "please" make videos about reverse engineering basics, and maybe other things also !! big thanks
@kakashisharigan336
@kakashisharigan336 3 жыл бұрын
Strong content!
@mostdefinitelynotatroll2454
@mostdefinitelynotatroll2454 5 жыл бұрын
As others already have said this video is very informative and in good quality. Good job! I guess you are German? How did you learn all of this?
@jacquesquipere
@jacquesquipere Жыл бұрын
Next level skills right here!
@traxonja
@traxonja 5 жыл бұрын
This channel is going to blow up! Subscribed.
@rainerzufall1868
@rainerzufall1868 5 жыл бұрын
Great video, thank you very much!
@GUMMYBALLZ
@GUMMYBALLZ 4 жыл бұрын
Sir. Not very many are able to articulate a lesson in a way my brain to absorb. Especially when it comes to variables in dialect. All said it can be frustrating at times. While I am going to have to rewatch this I would personally like to thank you for your time as well as your ability to clearly lay it out... I will mos def look for more of your tutorials
@OthmanAlikhan
@OthmanAlikhan 3 жыл бұрын
Super advanced. Thanks for the video =)
@heycherry100
@heycherry100 4 жыл бұрын
I'm watching all of your videos, very good content!
@ctfrookie1573
@ctfrookie1573 5 жыл бұрын
Woah, Man, that was awesome. I cant wait to see more from You!
@lucca1820
@lucca1820 5 жыл бұрын
awesome! cant wait for next video
@KarLKoX
@KarLKoX 3 жыл бұрын
As a user of Idea and doing some RE for time to time, this is very impressive ! All seems so easy but it is not.
@aurinator
@aurinator 3 жыл бұрын
Phenomenal vid/tutorial!!
@mariusk.9295
@mariusk.9295 5 жыл бұрын
you are amazing man, i really hope u keep going with this
@andreww3575
@andreww3575 5 жыл бұрын
Fantastic video! I keep checking KZfaq to see if you’ve uploaded.
@abdelazizsaad7676
@abdelazizsaad7676 3 жыл бұрын
This is so great. Keep it up.
@IvanJakesevic
@IvanJakesevic Жыл бұрын
So cool, will try something like this but for printer firmware to disable ink cartridge checks!
@Magovit
@Magovit 4 жыл бұрын
Wowwwwww Super!
@43ann
@43ann 5 жыл бұрын
Great video
@matteoo7212
@matteoo7212 4 жыл бұрын
Really nice video. I only hope that now you can upload more often.
@Djay0Epizode
@Djay0Epizode 4 жыл бұрын
DOPE AF
@Djay0Epizode
@Djay0Epizode 4 жыл бұрын
hey was looking for part 2 but found your 34C3 talk on SCADA system that will do i guess :), Again thank for sharing outside of con that's nice :)
@jc.baptiste
@jc.baptiste 5 жыл бұрын
Awesome, thank you !
@TheMadMagician87
@TheMadMagician87 4 жыл бұрын
Wow, great to see how this sort of stuff is done. Subscribed and look forward to checking out some of your other videos!
@user-dx1gs7yz5f
@user-dx1gs7yz5f 4 жыл бұрын
Danke Bruder. Hilft mir sehr
@nezu_cc
@nezu_cc 5 жыл бұрын
Do you do any other stuff? I would happily see some of it no matter what it is. You are awesome.
@stacksmashing
@stacksmashing 5 жыл бұрын
Definitely in the future!
@paprika5487
@paprika5487 5 жыл бұрын
Thank you for these tutorials!
@fuanka1724
@fuanka1724 5 жыл бұрын
Very interesting, thanks for sharing!
@linonava7149
@linonava7149 4 жыл бұрын
great and amazing tutorial
@michaelcohen4503
@michaelcohen4503 5 жыл бұрын
Really great video and good explanation. Thanks you so much for it...
@xntumrfo9ivrnwf
@xntumrfo9ivrnwf Жыл бұрын
Superb!
@450o054
@450o054 3 жыл бұрын
everything flew over my head
@elliotmason681
@elliotmason681 5 жыл бұрын
Smashed that subscribe and notify button fast AF! Keep them coming!
@nicoladellino8124
@nicoladellino8124 5 жыл бұрын
Nice video bro :-)
@Jay22217
@Jay22217 5 жыл бұрын
These are fantastic. Keep going
@7xr1e20ln8
@7xr1e20ln8 5 жыл бұрын
This video is amazing. Subbed
@westernvibes1267
@westernvibes1267 4 жыл бұрын
Mate could you make more firmware hacking videos please. This is sick !!
@shreatehVlog
@shreatehVlog 5 жыл бұрын
thank you for your videos, its good if we can see more of your videos about CTF binary reverse. and please make your videos more easy to understand for beginners . thank you
@asafcohen3562
@asafcohen3562 4 жыл бұрын
great content
@foosabraun2461
@foosabraun2461 5 жыл бұрын
Awesome stuff, thank you!! :)
@tj_1260
@tj_1260 Жыл бұрын
yo this is insane
@0xbitbybit
@0xbitbybit 5 ай бұрын
Where did you learn to use Ghidra so well? Would love to do a course or something to get up to speed and know my way around it a bit better, I feel like it's WAY more powerful than most people realize, it's just hard to use. Also, this was successful purely because the older firmware was available on the vendor website right? Or is there another approach you can take where you CAN'T access the old firmware and get the decryption key? Thanks for the awesome videos! 🙏
@und3rgr0undfr34k
@und3rgr0undfr34k 5 жыл бұрын
woww! So much good info! Awesome!
@HansBaier
@HansBaier 2 жыл бұрын
Awesome! Thanks!
@theweirddev
@theweirddev 4 жыл бұрын
I subscribed and enabled the notification. Thanks for the great video.
@jmcharette
@jmcharette 3 жыл бұрын
excellent!
@sosainfotech3834
@sosainfotech3834 5 жыл бұрын
Wow that was awesome 😊
@tehdrek
@tehdrek 5 жыл бұрын
This is so awesome! Sure hope NSA pays you well :*
@kartoffelwaffel
@kartoffelwaffel 5 жыл бұрын
Haha that's what I was thinking. He seems pretty experienced with software the NSA released only a month ago...
@gravypadruski462
@gravypadruski462 5 жыл бұрын
Boom! Subscribe button got hit ! The bell got hit !
Bare-metal ARM firmware reverse engineering with Ghidra and SVD-Loader
14:40
Ghidra quickstart & tutorial: Solving a simple crackme
11:30
stacksmashing
Рет қаралды 334 М.
ОБЯЗАТЕЛЬНО СОВЕРШАЙТЕ ДОБРО!❤❤❤
00:45
Please Help Barry Choose His Real Son
00:23
Garri Creative
Рет қаралды 22 МЛН
Kind Waiter's Gesture to Homeless Boy #shorts
00:32
I migliori trucchetti di Fabiosa
Рет қаралды 13 МЛН
Comfortable 🤣 #comedy #funny
00:34
Micky Makeover
Рет қаралды 17 МЛН
Extracting Firmware from Embedded Devices (SPI NOR Flash) ⚡
18:41
Flashback Team
Рет қаралды 568 М.
#HITBLockdown D2 - Virtual Lab - Firmware Hacking With Ghidra - Thomas Roth & Dmitry Nedospasov
1:30:37
[0b00] Reversing 101 :: Hacking Closed-Source Firmware
24:40
Ghidra ГАЙД дизасм для новичков
12:55
Айтишник 👩‍💻
Рет қаралды 17 М.
An introduction to hacking video games with Ghidra
39:39
Hilltop
Рет қаралды 18 М.
Ghidra Scripting to Speed Up Reverse Engineering
17:24
LaurieWired
Рет қаралды 17 М.
MMORPG Bot Reverse Engineering and Tracking
9:46
LiveOverflow
Рет қаралды 671 М.
Reverse Engineering With Unicorn Emulation
21:03
OALabs
Рет қаралды 10 М.
How to Crack Software (Reverse Engineering)
16:16
Eric Parker
Рет қаралды 423 М.
ОБЯЗАТЕЛЬНО СОВЕРШАЙТЕ ДОБРО!❤❤❤
00:45