Reverse Engineering | ELF File Format | Beginners

preview_player
Показать описание
* While you are there, please sign up for the newsletter. Thank you!

#ReverseEngineering #Linux #Programming #CoolCamera
Рекомендации по теме
Комментарии
Автор

So interesting! I have to set time aside to watch all of your videos in order.

Dezombified
Автор

Kind of surprised how similar ELF seems to be with PE for Windows. I'm trying to understand ELF file structure so I can write shellcode for Linux machines. On Windows the FS register contains a pointer to the TIB and from that I can eventually get to the function table to find the functions I need to open a reverse shell. I've looked around online but it seems that FS/GS don't contain any such useful information as they do on Windows. Do you have any useful tips or information for this? And great video! Thanks.

edwardseverinsen
Автор

Hi, I see there something what is a little bit confusing for me. There is the entry point at address 0x1070. But readelf shows but section .text is placed on 0x1000 address. What is between of them? It's just another function or something else? BTW. Cool channel! :)

maciekg
Автор

Hi there. I hope you can help.
I need to update firmware that is normally released as a hex file.
But latest release is elf file.
I'm using windows but running python prompts for the motor controller I'm using.
Odrive is normally updated via st link or python prompt.
Cheers in advance

simonlaker
Автор

friend, good video, I have a problem, I want to know in what position this segment size is filmed, data and text, I found some things but I can not get that data, thank you very much, merry Christmas,

danielquintero
Автор

can we edit *.elf file? if it passable > suggest any tool for edit

xsoul
Автор

Can you make a patch for prog_ufs_sdm845.elf for xiaomi firmware

refinetricks
Автор

Can I reverse engineering on ps2 iso games to port them on a ps vita?

Nitolordgrave
Автор

how to patch elf file which tool need ?

gous