Reverse Engineering with Binary Ninja and gdb a key checking algorithm - TUMCTF 2016 Zwiebel part 1

preview_player
Показать описание

-=[ 🔴 Stuff I use ]=-

-=[ ❤️ Support ]=-

-=[ 🐕 Social ]=-

-=[ 📄 P.S. ]=-

All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

#CTF #ReverseEngineering
Рекомендации по теме
Комментарии
Автор

Awesome video! I remember watching this one year ago shortly after release. It was pretty confusing for me back then because of lack of knowledge and understanding. Now, ~ 1yr later... it makes so much more sense to me :)

MoritzDerErste
Автор

Super intresting!! Can't wait for part 2!

pasettodavide
Автор

I don't know how I ended up here and couldn't understand anything but already feel smarter

cebf
Автор

I wonder how this challenge was created

mufmuf
Автор

I didn't get this challenge during the competition. It was driving me crazy lol. Thanks for the video!! Btw what's your handle for ctfs??

musicislife
Автор

Cool and awesome skills.
Can you help with a video on extracting zip file password using radare2?

arunrmyt
Автор

Excellent Video. what is Vagrant linux vm? is it another linux distro?.

geekgeek
Автор

nice vid and all that stuff, but please answer one question: "Why do you use a mac?"

brian-pfdk
Автор

many interisting videos in your channel but I am very behind can you propose what shold a study before whatching this ? I only know c++

meudta
Автор

Is it okay to not understand anything?

rj-njuk
Автор

I'm, late to the party, but what calling convention are these functions at main @1:05 using? Looks like System V AMD64 ABI, but there are some inconsistencies :/

AbacateSexy