Reverse Engineering using Ghidra; Finding a flag by reversing an executable

preview_player
Показать описание
This is the BabyRev challenge from Foobar 2022 CTF. A binary checks our guess against a flag and tell us if its correct or not. We start with Strings, strace & ltrace and then go for our big gun: Ghidra !

Update: The z3py has a solve method which can be used for what I done that manually :D
Рекомендации по теме
Комментарии
Автор

Amazing video, easy to understand, clear and to the point. Well done!

easternplatypus
Автор

It was also fun to watch it in English, you rock dude. 🤩👊

nima
Автор

Great video, will you be going through other challenges from foobar 2022 ctf?

shaundole
Автор

I love your explanations, keep it up Jadi! Happily subscribed now ;)

Mystixor
Автор

I enjoyed the video although I wish to understand, maybe one day, thank you.

sabuein
Автор

yo, wonderful video, good explanation! thanks a lot

yegorpolishchuk
Автор

Just trying to understand - couldn't you make the changes to the text in ghidra itself?

baruchben-david
Автор

جادی که این چنل رو برای خارجیا زده ولی نمیدونه همه ایرانیا میان میبینن 😂😂

XMoresh