Reversing and Cracking first simple Program - bin 0x05

496,958
0
Published 2015-12-29
A very simple reversing challenge for Linux

GitHub: github.com/LiveOverflow/liveoverflow_youtube/tree/…
crackmes.de/
www.hopperapp.com/
www.hex-rays.com/products/ida/
github.com/radare/radare2

=[ ❤️ Support ]=

→ per Video: www.patreon.com/join/liveoverflow
→ per Month: youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

=[ 🐕 Social ]=

→ Twitter: twitter.com/LiveOverflow/
→ Website: liveoverflow.com/
→ Subreddit: www.reddit.com/r/LiveOverflow/
→ Facebook: www.facebook.com/LiveOverflow/

=[ 📄 P.S. ]=

All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

#ReverseEngineering

All Comments (21)
  • @_JohnHammond
    This is awesome. This is all, absolutely phenomenal. I've been taking part in many CTFs but I don't do well with binary exploitation (much more than simple buffer overflows and simple format string vulnerabilities) -- I don't know how to 'pwn' very well yet! I've subscribed -- how quickly we can expect more? :)
  • @alphathreat7574
    This video contains stuff no one will explain to you. That print to paper concept was awesome. Helped me a lot. THANKS A LOT
  • @greenhatsec
    Create a file "~/.gdbinit" with the text "set disassembly-flavor intel" to avoid typing the command to switch syntax everytime
  • @b00i00d
    As a complete assembly/disassembly n00b I've watched this vid several times, applying it to the example or to other codelets I've written. Pure gold! I'm slowly starting to get it! :)))
  • @PASTRAMIKick
    Most common jumps: je (jump if equal, zero flag = 1) jne (jump if not equal, zero = 0) jb (jump if unsigned lower, Carry=1) jbe (same as above with or equal) ja (jump if unsingned greater) jae (same as above with or equal) ... List goes on to more specified flag relative jumps, signed lower/greater jumps and a few weird ones.
  • @mrg1928
    This was really cool! Thank you, you just made Assembly 10x less intimidating for me.
  • Thanks for taking the time to do this in such an easy-to-understand professional manner
  • @ElRammo
    Just an observation, when you pause a video youtube forces the timeline bar which covers code, and also title at the top - this means that running fullscreen (second monitor) it's quite often I have to un-fullscreen and use theater mode. Might be a rare problem, but depending on how it affects things aesthetically it might be useful to at least not use the bottom/top ~15th for what the audience is actively looking at. Thanks though!
  • @alpstinger5083
    Guys all those struggling with this, watch the video again and again. Thanks to liveoverflow for this. This is insanely awesome!!
  • @SirKalasel
    Good job. Even after making a huge graphical game in assembly you did give me some new tools, well done! The way you explain stuff is great, keep going!
  • @mannip31
    "strings ./license_1" also gives you the key in this case. I know it's only an example.
  • Your visceral and immediate disgust at AT&T syntax is very relatable and made me literally laugh out loud!
  • If you want to get the main function in one line, you can use this command: "gdb -batch -ex 'file license_1' -ex 'set disassembly-flavor intel' -ex 'disassemble main' " I used it to pipe a lp in the end to print it (Just add "| lp" at the end of the command) but you have to configure your printer with cups
  • @unlokia
    Your teaching style demonstrates one SIMPLE thing, VERY WELL: It just goes to show, if one's mind doesn't naturally gravitate to - and understand - ASM - it doesn't matter HOW "1337" all these "H4X0R5" online think they are - none of it means ANYTHING if they can't translate it smoothly and concisely for people who aren't in their "club" - you are the EXCEPTION, and you teach SO WELL. God bless you and thank you, I mean it from the bottom of my heart.
  • @Saiphel
    I'm late but I've always wondered how cracking stuff like this works, and you made me understand everything, this is amazing <3
  • @notapirate505
    Made this crackme return the actual valid key when given the wrong one. That was a lot of fun, awesome videos.
  • @passingby1350
    This was beautiful. Thank you so much for walking it through TuT
  • @roguesecurity
    All your videos are really great and of top quality. Thank you very much bro. You are truly awesome. Keep it up :)