Reversing Statically-Linked Binaries with Function Signatures - bin 0x2D

แชร์
ฝัง
  • เผยแพร่เมื่อ 1 ต.ค. 2024

ความคิดเห็น • 71

  • @tox1cnoth160
    @tox1cnoth160 4 ปีที่แล้ว +17

    dude i love those zoom ins and the cartoonish arrows, it makes your videos so enjoyable to watch, they are a beauty

  • @jaredmeit6127
    @jaredmeit6127 4 ปีที่แล้ว +10

    I really like these videos. It is just like the early ones that I subscribed for. Although I do like your recent content, this format is my favourite. Covering 1 topic concisely as part of a series that gets gradually more in-depth.

  • @meithecatte8492
    @meithecatte8492 4 ปีที่แล้ว +6

    I'm pissed the video isn't 13:37 long.

    • @xrafter
      @xrafter ปีที่แล้ว

      Why?

    • @1.4142
      @1.4142 ปีที่แล้ว

      still waiting for a 13:37 long video

  • @mnageh-bo1mm
    @mnageh-bo1mm 4 ปีที่แล้ว +9

    Hi you... we need vids about reversing more common software.

    • @AneeshDogra
      @AneeshDogra 4 ปีที่แล้ว +5

      How about reverse engineering Source engine? @LiveOverflow!

    • @mnageh-bo1mm
      @mnageh-bo1mm 4 ปีที่แล้ว

      @@AneeshDogra sounds interesting

  • @PwnySlaystation01
    @PwnySlaystation01 4 ปีที่แล้ว +4

    I'm good with this type of video too, however I really have a hard time with the low audio. I don't see anyone in the comments mentioning it, so maybe it's just me, but I have to crank my laptop volume almost up to full to hear you in this format. Upping the volume a bit would be greatly appreciated!

  • @matevarga3040
    @matevarga3040 4 ปีที่แล้ว +5

    PLS KEEP the comntent good. Q_Q
    Im happy you have daily but I'm a bit concern about it.
    Bit of thinking. Actually this small bits keep me entertained and I also learn the same time. It's very digestable.
    It's a win. Wish you good luck /life/etc. .

  •  4 ปีที่แล้ว +1

    Hello. I am studiying and developing a Deep learning algorithm. I wonder, is there any deep learning method to extract and recognize the binary sembols. Deep learning is very good at it.
    It can learn almost all sembols and behaviour of compiler. I know it takes very long time but it can learn.

  • @athuljose6094
    @athuljose6094 4 ปีที่แล้ว +12

    Could you make a list of all resources that could help in learning like wargame sites ? I don't know if you have something like this already on your site.
    Thanks for these videos mate.

    • @phmen6706
      @phmen6706 4 ปีที่แล้ว

      da mwnuseee

  • @Davi-c4q
    @Davi-c4q 4 ปีที่แล้ว +1

    How are these signatures made? it's some kind hash function of all the bytes used by the function, substituting `call`s by the bytes of the internal functions?

  • @EvilSapphireR
    @EvilSapphireR 4 ปีที่แล้ว +3

    I spent a good 1 hour understanding this video and the weird flow of the statically linked stripped binary. So if I'm not wrong, whenever dynamic linking happens in a process with a debugger attached to it the debugger watches for the symbols being used for the linking and can subsequently tell the user the function names?

    • @EE-cc5bd
      @EE-cc5bd 4 ปีที่แล้ว +2

      The stripped binary only has its own debug symbols removed, but still has its import table (symbols referring to external functions/variables to be dynamically bound). So no need for a debugger, a proper disassembler is enough.
      (It is the most common form of executable, no debug symbols and dynamic linking).
      The second part of the video is about using signatures to identify functions that we know of from another binary, it's a difficult task since the assembly can change between different compilations and thus different versions of a library. There are different identification methods around: flair (pattern + cross references), yara (behavior based, return value), ..

  • @pseudo_goose
    @pseudo_goose 4 ปีที่แล้ว +1

    wait a moment, that breadboard computer looks familiar ....

  • @zCri
    @zCri 4 ปีที่แล้ว +1

    Epic hacker man is back at it again

  • @thewelder3538
    @thewelder3538 ปีที่แล้ว

    This seems to be a lesson in why you don't decompile code, you disassemble it. If you understand x86 enough, you can always see exactly what is happening and you don't run into problems where you end up with rogue function calls that shouldn't be there.

  • @ECX0x100h
    @ECX0x100h ปีที่แล้ว

    How do we determine what libc version is embedded within a static/stripped binary?

  • @youtubeargentina349
    @youtubeargentina349 ปีที่แล้ว

    Thanks a million for this amazing video. You answered many of my questions in just a few minutes :)

  • @enocknicolas7163
    @enocknicolas7163 4 ปีที่แล้ว +1

    daily uploads👍👌

  • @BosakMaw
    @BosakMaw 4 ปีที่แล้ว +4

    But can you reverse a linked list?

  • @yuxin7440
    @yuxin7440 4 ปีที่แล้ว

    Great video, can you also created a video talking about other common anti debugging techniques and how to bypass them?

  • @MrHatoi
    @MrHatoi 4 ปีที่แล้ว

    Would be nice to have the links for stuff you used in the video

  • @lordkauck
    @lordkauck 4 ปีที่แล้ว

    Hold up, who's the hot guy he hired? Lmfao

  • @pep1878
    @pep1878 4 ปีที่แล้ว

    I would love to see some reversing with cutter (if you abandoned gdb/r2...) which also added the ghidra decompiler....

  • @MCTTABOB
    @MCTTABOB 4 ปีที่แล้ว

    i have spent hours reversing static stripped bins without knowing this, labeling stuff by hand.. thanks so much haha

  • @lancemarchetti8673
    @lancemarchetti8673 ปีที่แล้ว

    Awesome.

  • @patatopotate4692
    @patatopotate4692 4 ปีที่แล้ว +3

    Could you play that piano for us please? :)

  • @hanshansli2238
    @hanshansli2238 4 ปีที่แล้ว

    Love the shorter videos. And right in the sweet spot in terms of difficulty, at least for me

  • @BlackHermit
    @BlackHermit 3 ปีที่แล้ว

    Great volumeeeeeeeeeeeee! :)

  • @techchannel1781
    @techchannel1781 4 ปีที่แล้ว

    Hah Can you do that using android phone

  • @netanelkomm5636
    @netanelkomm5636 7 หลายเดือนก่อน

    This guy's intro rocks

  • @anthonything
    @anthonything 4 ปีที่แล้ว

    big cool

  • @metaorior
    @metaorior 4 ปีที่แล้ว

    nice

  • @Veso266
    @Veso266 4 ปีที่แล้ว

    Where is a .pdb file for not stripped binaries on linux
    Because on windows if you remove .pdf file you loose all symbols

    • @LiveOverflow
      @LiveOverflow  4 ปีที่แล้ว

      it's in the ELF binary itself, no external symbol file needed. If you strip a ELF binary you can see the size is smaller.

    • @Veso266
      @Veso266 4 ปีที่แล้ว

      @@LiveOverflow can you use Ghidra to reverse engeneer linux bin on windows or you have to use linux to reverse linux binaries?

    • @Demonslay335
      @Demonslay335 4 ปีที่แล้ว

      @@Veso266 Ghidra can reverse Linux binaries on any host platform. Same goes for IDA.

  • @DoorThief
    @DoorThief 4 ปีที่แล้ว

    Fifth! Love your videos

  • @zuhayr1337
    @zuhayr1337 4 ปีที่แล้ว

    The haiiiiiirrrrr!!!!! 😍😍

  • @adrianstangu7602
    @adrianstangu7602 4 ปีที่แล้ว

    GBU !

  • @zacwesleybrown
    @zacwesleybrown 4 ปีที่แล้ว

    Cool video

  • @blackbeard4532
    @blackbeard4532 4 ปีที่แล้ว

    Noice keep them coming!

  • @chanakanztech4108
    @chanakanztech4108 4 ปีที่แล้ว

    nice!

  • @blizzy78
    @blizzy78 4 ปีที่แล้ว

    Now decompile a Go program.

    • @xrafter
      @xrafter ปีที่แล้ว

      Or rust or anything other than C.

  • @gyroninjamodder
    @gyroninjamodder 4 ปีที่แล้ว

    Why would a program use md5 in 2019? MD5 has been broken for a long time.

    • @LiveOverflow
      @LiveOverflow  4 ปีที่แล้ว +4

      Ah well. Then I don’t know why any programmer would still write code with buffer overflow vulnerabilities. Or why XSS still exists. Or why iPhones still get jailbroken. Why are they not just writing secure code?!?!?

    • @gyroninjamodder
      @gyroninjamodder 4 ปีที่แล้ว

      @@LiveOverflow That is not a fair comparison. People consciously choose to use MD5 where buffer overflows, XSS, and jail vulnerabilities happen on accident. Buffer overflows can be effectively eliminated by using a language that keeps tracks of buffer sizes with dependent types. XSS can be effectively mitigated by using refinement types to keep track of whether data is sanitized. Preventing escaping from a jail is much more complicated, but using formal verification of your specification and design can help avoid it.

    • @eIicit
      @eIicit 4 ปีที่แล้ว

      @@gyroninjamodder you are missing the point, friend.

    • @gyroninjamodder
      @gyroninjamodder 4 ปีที่แล้ว

      @@eIicit What point am I missing?

    • @antiteal3050
      @antiteal3050 4 ปีที่แล้ว

      md5 is pretty fast, pretty wide spread, and it's good enough for most tasks. the holes that it has aren't too significant enough for everyone to switch to another hash function. it's "good enough" when generating checksums and the like.

  • @patrick1020000
    @patrick1020000 4 ปีที่แล้ว

    Could you make a video using the built-in Ghidra function identifier? It is possible to create signatures that way

  • @Afif87123
    @Afif87123 4 ปีที่แล้ว +1

    First

  • @yumbuboyumbubo8230
    @yumbuboyumbubo8230 4 ปีที่แล้ว +1

    Real Hackers don't use Ghidra, or GDB
    Back in the good old days -- the "Golden Era" of computers, it was easy to separate the men from the boys (sometimes called "Real Men" and "Quiche Eaters" in the literature). During this period, the Real Men were the ones that understood binary code, and the Quiche Eaters were the ones that didn't. A real computer programmer said things in assebly. (they actually talked in capital letters, you understand)

  • @mfrederikson
    @mfrederikson 4 ปีที่แล้ว

    Nothing against your face, but it was way easier to focus on the content before.

    • @LiveOverflow
      @LiveOverflow  4 ปีที่แล้ว +1

      I’m just trying to have some fun with daily videos in december. Calling it haxember. It’s just the 4th day old style videos are not gone. I just have to do a different style to be able to make daily stuff. It’s just an experiment ;)