HackadayU: Reverse Engineering with Ghidra Class 1

211,256
0
Published 2020-07-16

All Comments (21)
  • @FrostByte990
    It's upsetting how clear and concise this lesson is compared to my past training. Amazing series so far!
  • @billjon2732
    A lot of stuff I didn’t know so thanks for the review of everything before diving in 👌
  • @redpillcommando
    I love this and I want to see more on this subject. Thank you.
  • @paullee107
    Awesome awesome awesome - this is exactly what I was looking for, in hackaday form. Thanks so kindly!
  • @OxTongue0
    Very well made content and I thoroughly enjoyed the talk and learned something new
  • @jeffmoye
    35:34 push and pop. If the stack grows down (towards lower and lower memory locations as in your animation, which is correct for the x86 architectures), then PUSHing will DECREASE the stack pointer. POPing will INCREASE the pointer.
  • @Tyler-jd3ex
    When I saw there was all the episodes, I was so happy. I love that there’s so many people interested in this stuff to where there’s PLENTY enough for any person who wants to learn, yet it’s not like even coding is an extremely popular hobby/interest/career among all people
  • @abandonedmuse
    Amazing class. I think I have seen assembly code taught a million times but I FINALLY UNDERSTAND IT PERFECTLY! Wow. Quick question and this may be out of the scope pf your class but I was working on my own files and I have a ton of instructions on my machine considered RAW and it says unknown and the instructions give errors with ?? Question marks. Any idea what this means? Thanks again!
  • @ryusaki6902
    Thanks for the content, i'm learning a lot! Any chance we get into PE reversing at some point of this course?
  • @cjk568
    very well taught! thank you.
  • @Aeviu
    Thanks for the free content!
  • @mikebest6670
    very interesting thanks for. the lesson good. advice
  • thanks for your effort and time you are awesome (ps: audio quality can be improved even if you are not gonna buy a new microphone)❤❤❤