Тёмный

Reversing Statically-Linked Binaries with Function Signatures - bin 0x2D 

LiveOverflow
Подписаться 895 тыс.
Просмотров 62 тыс.
50% 1

Опубликовано:

 

14 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 71   
@tox1cnoth160
@tox1cnoth160 4 года назад
dude i love those zoom ins and the cartoonish arrows, it makes your videos so enjoyable to watch, they are a beauty
@jaredmeit6127
@jaredmeit6127 4 года назад
I really like these videos. It is just like the early ones that I subscribed for. Although I do like your recent content, this format is my favourite. Covering 1 topic concisely as part of a series that gets gradually more in-depth.
@PwnySlaystation01
@PwnySlaystation01 4 года назад
I'm good with this type of video too, however I really have a hard time with the low audio. I don't see anyone in the comments mentioning it, so maybe it's just me, but I have to crank my laptop volume almost up to full to hear you in this format. Upping the volume a bit would be greatly appreciated!
@MCTTABOB
@MCTTABOB 4 года назад
i have spent hours reversing static stripped bins without knowing this, labeling stuff by hand.. thanks so much haha
@matevarga3040
@matevarga3040 4 года назад
PLS KEEP the comntent good. Q_Q Im happy you have daily but I'm a bit concern about it. Bit of thinking. Actually this small bits keep me entertained and I also learn the same time. It's very digestable. It's a win. Wish you good luck /life/etc. .
@netanelkomm5636
@netanelkomm5636 7 месяцев назад
This guy's intro rocks
@youtubeargentina349
@youtubeargentina349 Год назад
Thanks a million for this amazing video. You answered many of my questions in just a few minutes :)
@mnageh-bo1mm
@mnageh-bo1mm 4 года назад
Hi you... we need vids about reversing more common software.
@AneeshDogra
@AneeshDogra 4 года назад
How about reverse engineering Source engine? @LiveOverflow!
@mnageh-bo1mm
@mnageh-bo1mm 4 года назад
@@AneeshDogra sounds interesting
@athuljose6094
@athuljose6094 4 года назад
Could you make a list of all resources that could help in learning like wargame sites ? I don't know if you have something like this already on your site. Thanks for these videos mate.
@phmen6706
@phmen6706 4 года назад
da mwnuseee
@pep1878
@pep1878 4 года назад
I would love to see some reversing with cutter (if you abandoned gdb/r2...) which also added the ghidra decompiler....
4 года назад
Hello. I am studiying and developing a Deep learning algorithm. I wonder, is there any deep learning method to extract and recognize the binary sembols. Deep learning is very good at it. It can learn almost all sembols and behaviour of compiler. I know it takes very long time but it can learn.
@hanshansli2238
@hanshansli2238 4 года назад
Love the shorter videos. And right in the sweet spot in terms of difficulty, at least for me
@EvilSapphireR
@EvilSapphireR 4 года назад
I spent a good 1 hour understanding this video and the weird flow of the statically linked stripped binary. So if I'm not wrong, whenever dynamic linking happens in a process with a debugger attached to it the debugger watches for the symbols being used for the linking and can subsequently tell the user the function names?
@EE-cc5bd
@EE-cc5bd 4 года назад
The stripped binary only has its own debug symbols removed, but still has its import table (symbols referring to external functions/variables to be dynamically bound). So no need for a debugger, a proper disassembler is enough. (It is the most common form of executable, no debug symbols and dynamic linking). The second part of the video is about using signatures to identify functions that we know of from another binary, it's a difficult task since the assembly can change between different compilations and thus different versions of a library. There are different identification methods around: flair (pattern + cross references), yara (behavior based, return value), ..
@Davi-c4q
@Davi-c4q 4 года назад
How are these signatures made? it's some kind hash function of all the bytes used by the function, substituting `call`s by the bytes of the internal functions?
@yuxin7440
@yuxin7440 4 года назад
Great video, can you also created a video talking about other common anti debugging techniques and how to bypass them?
@thewelder3538
@thewelder3538 Год назад
This seems to be a lesson in why you don't decompile code, you disassemble it. If you understand x86 enough, you can always see exactly what is happening and you don't run into problems where you end up with rogue function calls that shouldn't be there.
@zCri
@zCri 4 года назад
Epic hacker man is back at it again
@MrHatoi
@MrHatoi 4 года назад
Would be nice to have the links for stuff you used in the video
@ECX0x100h
@ECX0x100h Год назад
How do we determine what libc version is embedded within a static/stripped binary?
@lancemarchetti8673
@lancemarchetti8673 Год назад
Awesome.
@enocknicolas7163
@enocknicolas7163 4 года назад
daily uploads👍👌
@pseudo_goose
@pseudo_goose 4 года назад
wait a moment, that breadboard computer looks familiar ....
@adrianstangu7602
@adrianstangu7602 4 года назад
GBU !
@anthonything
@anthonything 4 года назад
big cool
@zacwesleybrown
@zacwesleybrown 4 года назад
Cool video
@BlackHermit
@BlackHermit 3 года назад
Great volumeeeeeeeeeeeee! :)
@meithecatte8492
@meithecatte8492 4 года назад
I'm pissed the video isn't 13:37 long.
@xrafter
@xrafter Год назад
Why?
@1.4142
@1.4142 Год назад
still waiting for a 13:37 long video
@chanakanztech4108
@chanakanztech4108 4 года назад
nice!
@metaorior
@metaorior 4 года назад
nice
@blackbeard4532
@blackbeard4532 4 года назад
Noice keep them coming!
@BosakMaw
@BosakMaw 4 года назад
But can you reverse a linked list?
@patrick1020000
@patrick1020000 4 года назад
Could you make a video using the built-in Ghidra function identifier? It is possible to create signatures that way
@zuhayr1337
@zuhayr1337 4 года назад
The haiiiiiirrrrr!!!!! 😍😍
@Veso266
@Veso266 4 года назад
Where is a .pdb file for not stripped binaries on linux Because on windows if you remove .pdf file you loose all symbols
@LiveOverflow
@LiveOverflow 4 года назад
it's in the ELF binary itself, no external symbol file needed. If you strip a ELF binary you can see the size is smaller.
@Veso266
@Veso266 4 года назад
@@LiveOverflow can you use Ghidra to reverse engeneer linux bin on windows or you have to use linux to reverse linux binaries?
@Demonslay335
@Demonslay335 4 года назад
@@Veso266 Ghidra can reverse Linux binaries on any host platform. Same goes for IDA.
@gyroninjamodder
@gyroninjamodder 4 года назад
Why would a program use md5 in 2019? MD5 has been broken for a long time.
@LiveOverflow
@LiveOverflow 4 года назад
Ah well. Then I don’t know why any programmer would still write code with buffer overflow vulnerabilities. Or why XSS still exists. Or why iPhones still get jailbroken. Why are they not just writing secure code?!?!?
@gyroninjamodder
@gyroninjamodder 4 года назад
@@LiveOverflow That is not a fair comparison. People consciously choose to use MD5 where buffer overflows, XSS, and jail vulnerabilities happen on accident. Buffer overflows can be effectively eliminated by using a language that keeps tracks of buffer sizes with dependent types. XSS can be effectively mitigated by using refinement types to keep track of whether data is sanitized. Preventing escaping from a jail is much more complicated, but using formal verification of your specification and design can help avoid it.
@eIicit
@eIicit 4 года назад
@@gyroninjamodder you are missing the point, friend.
@gyroninjamodder
@gyroninjamodder 4 года назад
@@eIicit What point am I missing?
@antiteal3050
@antiteal3050 4 года назад
md5 is pretty fast, pretty wide spread, and it's good enough for most tasks. the holes that it has aren't too significant enough for everyone to switch to another hash function. it's "good enough" when generating checksums and the like.
@patatopotate4692
@patatopotate4692 4 года назад
Could you play that piano for us please? :)
@lordkauck
@lordkauck 4 года назад
Hold up, who's the hot guy he hired? Lmfao
@blizzy78
@blizzy78 4 года назад
Now decompile a Go program.
@xrafter
@xrafter Год назад
Or rust or anything other than C.
@yumbuboyumbubo8230
@yumbuboyumbubo8230 4 года назад
Real Hackers don't use Ghidra, or GDB Back in the good old days -- the "Golden Era" of computers, it was easy to separate the men from the boys (sometimes called "Real Men" and "Quiche Eaters" in the literature). During this period, the Real Men were the ones that understood binary code, and the Quiche Eaters were the ones that didn't. A real computer programmer said things in assebly. (they actually talked in capital letters, you understand)
@DoorThief
@DoorThief 4 года назад
Fifth! Love your videos
@techchannel1781
@techchannel1781 4 года назад
Hah Can you do that using android phone
@Afif87123
@Afif87123 4 года назад
First
@mfrederikson
@mfrederikson 4 года назад
Nothing against your face, but it was way easier to focus on the content before.
@LiveOverflow
@LiveOverflow 4 года назад
I’m just trying to have some fun with daily videos in december. Calling it haxember. It’s just the 4th day old style videos are not gone. I just have to do a different style to be able to make daily stuff. It’s just an experiment ;)
Далее
A simple Format String exploit example - bin 0x11
10:01
Reverse Engineering Malware with Ghidra
1:13:43
Просмотров 5 тыс.
A Vulnerability to Hack The World - CVE-2023-4863
18:00
The Circle of Unfixable Security Issues
22:13
Просмотров 115 тыс.
I Reverse Engineered this Program Automatically.
16:53
Exploit Dev Pitfall Corrupted Shellcode
16:36
Просмотров 35 тыс.
All Rust string types explained
22:13
Просмотров 176 тыс.
Trying to Find a Bug in WordPress
18:07
Просмотров 91 тыс.