Reverse-Engineering - How Do Hackers Debug & Hack System Software/Services (2023)

preview_player
Показать описание
In this video i will show everyone the Theoretical & Practical side of understanding and learning Reverse-Engineering , to modify Machine-Code/Code overall in the Memory inside Binary Software Files on Systems, and also the Fundamentals about the System Architechture x64/x32-x86 Bit , as how it works in the smallest of Bits/Bytes form on the Memory-Layout Architechture . I will be showing a variety of Techniques like Cracking Games , Manipulating basic "Hello World" compiled C++ code Binary , and overall i will show different kind of Debugging/Reverse-Engineering Techniques on the Tool x64DBG.
- Educational Purposes Only

If the Video was helpful and useful for learning Reverse-Engineering in a sense to understand Problematic Bugs/Vulnerabilities or Code in a Binary, subscribe for more videos ! . Thanks

Reverse-Engineering Tools:

(Best for Static Analysis And Converting Assembly-code to C/C++)
(Static & Dynamic Analysis)
(Static & Dynamic Analysis)
(Terminal-Based Static & Dynamic Analysis)
(Recommened for Mac OSX)
(Best For iOS/iPad/Apple Watch/....Apple Systems)

Introduction 1: Assembly-Registers: 00:00
Introduction 2: Memory-Architecture: 07:53
Introduction 3: Machine-Code/Binary Data Segments: 12:47
Introduction 4: Stack & Heap Memory: 17:16

Tools/Programm Used For Reverse-Engineering Windows/Mac OSX/Linux: 22:15

Practical 1: Tool Functions & Modifying "Hello" Code Binary To Display As Hellx String: 23:58
Practical 2: Attach & Detach Processes And Dynamic Analysis of Binaries:
33:28
Practical 3: Cracking Game Softwares: 36:27
Practical 4 Debugger-Breakpoints:40:25

Social-Medias:

#security #cybersecurity #youtube #youtuber #it #informationtechnology #reverseengineering #learning #studying #windows #windows10 #windows11 #engineering #computer #binary #code #programming #tools #technology #2023 #subscribe #subforsub #subscribetomychannel #subscribers #system #operatingsystem #offensivesecurity #cyber #cyberawareness #video #videos #whitehat #education #kernel
#data #coding #bug #bugs #digital #assembly #c++ #c #knowledge #knowledgeispower #follow #follow4follow #follow4followback #followforfollowback #engineering #computers #computerknowledge #application #applications #software #program
Рекомендации по теме
Комментарии
Автор

Video Timeline:
Introduction 1: Assembly-Registers: 00:00

Introduction 2: Memory-Architecture: 07:53
Introduction 3: Machine-Code/Binary Data Segments: 12:47
Introduction 4: Stack & Heap Memory: 17:16
Tools/Programm Used For Reverse-Engineering Windows/Mac OSX/Linux: 22:15
Practical 1: Tool Functions & Modifying "Hello" Code Binary To Display As Hellx String: 23:58
Practical 2: Attach & Detach Processes And Dynamic Analysis of Binaries:
33:28
Practical 3: Cracking Game Softwares: 36:27
Practical 4 Debugger-Breakpoints: 40:25

xenjin
Автор

Reverse-Engineering Tools:

(Best for Static Analysis And Converting Assembly-code to C/C++)
(Static & Dynamic Analysis)
(Static & Dynamic Analysis)
(Terminal-Based Static & Dynamic Analysis)
(Recommened for Mac OSX)
(Best For iOS/iPad/Apple Watch/....Apple Systems)

xenjin