How Ghidra Changed Reverse Engineering Forever

preview_player
Показать описание
Explore how Ghidra, the powerful reverse engineering tool developed by the NSA, has revolutionized the field of cybersecurity and transformed the way professionals analyze and understand complex software systems. In this video, we dive into the features that make Ghidra a game-changer, from its disassembly and decompilation capabilities to its collaborative framework designed for teams. Whether you're an IT professional, cybersecurity enthusiast, or someone pursuing a career in ethical hacking or malware analysis, this video will provide valuable insights into how Ghidra simplifies reverse engineering tasks and supports cyber defense strategies.

Learn why cybersecurity professionals are leveraging Ghidra for malware detection, vulnerability research, and software security analysis. Discover how this free and open-source tool compares to other industry standards like IDA Pro, and why it’s become an essential part of any cybersecurity toolkit.

If you're looking to enhance your skills in reverse engineering, break into the exciting world of cybersecurity, or stay updated on top tools for IT and technology experts, this video is a must-watch. Don’t miss out—hit play now and take your cybersecurity knowledge to the next level! Subscribe for more cybersecurity tutorials and insights.
#Ghidra #ReverseEngineering #Cybersecurity #ITProfessionals #EthicalHacking

🐦 X (Twitter): @yanivhoffman

📚 OccupyTheWeb Books - Affiliate Links:

🌐 OccupyTheWeb Community - Hackers-Arise:
🎟️ 20% Coupon Code: "YANIV" (Use for everything in the store!)

⏱️ Chapters:

00:00-01:12 - 🗒️ What We'll Cover Today
01:12-02:13 - 📖 New OTW Book Announcement!
02:13-04:14 - 🛠️ The Most Important Tools in Cybersecurity
04:14-08:47 - 🔍 Introduction to Ghidra Tool
08:47-16:47 - 🚀 How to Use Ghidra (Step-by-Step)
16:47-28:59 - ⚙️ Simple vs. Advanced Ways to Use Ghidra
28:59-35:40 - 🖥️ SMBV1 Analysis
35:40-48:17 - 🧑‍💻 Decompiling the Main Function with Ghidra
48:17-57:51 - 🔓 How Do People Crack Software?
57:51-1:01:39 - 📌 Summary and Conclusion

🎥 Watch More Cybersecurity Fundamental Videos:
Рекомендации по теме
Комментарии
Автор

I’d love to hear your thoughts! Drop a comment below and don’t forget to like and share if you enjoyed the video!

yanivhoffman
Автор

Hi Everyone, video that so many of you been asking.... so hope you enjoy it. If you want to support me, a like or a comment, or share on this video would really be appreciated. Thx a lot Yaniv

yanivhoffman
Автор

You've taught me so much over the years and I thank you very much my friend. Wonderful content and very happy to of found your channel.

TroßbachPaul
Автор

Wow, so much detail, and so much patient, so smooth, he really wants to reveal the secrets of everything, amazing, very, very matured narative, do you have kinda similar in windows, ???? Excited,

jovanhimal
Автор

superb man please bring the 2nd part soon🙏🙏

Zagnikasalam
Автор

I have a portable app (created using Cameyo).. I'd like to change some of the text strings that are shown. I did a search for the strings using HxD, but couldn't find the strings (probably not saved as ascii). Do you think Ghidra, IDA Pro, Cutter, Binary Ninja, OllyDbg, x64dbg might work best in working with this exe generated by Cameyo ?

bennguyen
Автор

Q. Would you use Ghidra for Android/iPhone App Bug Bounty Hunting? Thank y'all. Tifkat :)

happyeverafter
Автор

Please please make a video about ida64 pro.
And how do you disassemble software?.
This could be an amazing idea and it's also really interesting, at least to me.

Fuxsy_Fox
Автор

I don't see the link for the book that is shown in the video, all the books in the description have different covers and titles ... ???

sligon
Автор

Hi yaniv what type laptop use master hacker otw ?? And thanks ❤

Fabian-dn
Автор

Asalamaleikum from Kosova.Our brothers from PAKISTAN developed Ghidra

abdulaiabdurahmani
Автор

What about malware like u can show a test ¿

hichemsavastano
Автор

Hie Yaniv and my Master OTW. Maybe I am out off topic, I have question . I installed latest Kali Linux it failed to install virtualbox and Ghidra as well

munyaradzitaurai
Автор

can't believe that a course for thinking people is promoting the shallow idea that using strings you get information on who wrote the code. So if I write in the strings that it was you, then it was you, lol !

angelg
Автор

Basically an hour long advertisement for OTW. Had to laugh a couple of times: the off-handed comment how starting hackers prefer free SW - well, yeah especially if they invested in one of your 'membership packages', or stating his 'current' preference for VM with Yaniv very quickly nodding his approval - hmmm how much kick-back was in that gents?

swampyswampmaister
welcome to shbcf.ru