Agree, reversing is hard! I started learning about reversing by playing CTFs and reading challenge writeups (especially if I couldn't solve the problem). At the end of the day - reversing (for me) translates to a lot of time reading, failing and practicing.
For a real world problem, no. There are a number of channels which reverse malware, could be a good place to start! For CTF style problems, you can try 247CTF.com
Nice video but I don't understand why the transposition table uses 4 byte values to store 2 char values with 2 null bytes, wouldn't it be easier to use cx instead of using ecx? Also why does the function use both ecx and edx to access these characters when it can be accessed by using cl and ch. Is this some form of code obfuscation or just a compiler quirk?
Very interesting! Maybe you have heard that ubisoft has shut down The Crew 1, an always online racing game that has an integrated offline mode not available for normal players. Could the same or a similar method be used to make this offline mode available?
Can you show a bit more on how you use Binary Ninja? Not everyone is super familiar with the tool. Better yet would be to use a free alternative like Ghidra or Cutter
Binary ninja is free to use (at least it used to be..). In other videos I use ghidra, x64dbg, ollydbg, etc. Unfortunately, there is some assumed knowledge required to follow the content. I might put out more entry level content in the future!
Is it possible to reverse engineer an old multiplayer game from like 2001 that has been offline for years to be able to bring a multiplayer server back, with little to no documentation?
Very nice video mate keep up the good work , do ya recommend any resources to start learning how to reverse engineering because even so your video overall is well explain and understandable i still need to learn a lot lol
Reverse engineering is hard! I don't know of a single resource.. I suggest getting your hands dirty with some tools. For example, try and emulate what was done in this video and recreate the scripts to reverse the algorithm.
@@247CTF Thank you so much for your answers! I am getting into the debugging world, and always nice too see there is humble folks out there willing to help.
Hmm, yes I had the same error in my output too! Must have missed something in the assembly.. The function is kind enough to also encode everything you send it - so if you set a breakpoint on the function you can see what happens as an output when you send "QA" as an input!
You: I hate this video 😠
Me: wololololo
You: I love this video 🤗
Can this work for codemeter protect software?
Ucluma?
I love this, please make the next one soon! I really want to see how you write the exploit
🏗️ Will be finished in a few weeks 🏗️
This video proves that sub count is independent of quality
Not sure which way to take this comment 🔥
Subbed and shared. Quality work, keep them coming!
Welcome aboard!
thank you for your work mate, really appreciate it! also, your voice is incredibly soothing and perfect for explaining this stuff absolutely lovely
😂
I saw Age of Empire and reverse engineering immediately subbed❤
saw Reverse Engineering immediately subbed
This is amazing! Thanks for the video. It could be great to do the same for AoE 2 or Empire Earth.
That would be cool!
Bro, how did you manage to put the entire program on a singlr graph? It is no easy task. Please enlighten us
this is kinda hard bro. Could you tell me more abt how u began with reverse engineering and what sources u followed to come to this level?
Agree, reversing is hard! I started learning about reversing by playing CTFs and reading challenge writeups (especially if I couldn't solve the problem). At the end of the day - reversing (for me) translates to a lot of time reading, failing and practicing.
@@247CTFty i really appreciate this answer. See ya when im a pro ;)
@@internationalekookdag2405 awesome, come back when you are!
@@internationalekookdag2405 are you a pro yet?
@@internationalekookdag2405where you at now
good shit bro, subbed
if you continue with this pattern, you'll beat live over flow in no time
Thanks for the support!
Such a good video
Got any good resources to practice reverse engineering for a real world problem? with solution?
For a real world problem, no. There are a number of channels which reverse malware, could be a good place to start! For CTF style problems, you can try 247CTF.com
Nice video but I don't understand why the transposition table uses 4 byte values to store 2 char values with 2 null bytes, wouldn't it be easier to use cx instead of using ecx? Also why does the function use both ecx and edx to access these characters when it can be accessed by using cl and ch.
Is this some form of code obfuscation or just a compiler quirk?
No idea, maybe the game supports Unicode in messages
Can you make a video talking about assembly? You explain really well, but I've felt a bit lost.
Don't have the time to make new videos right now, maybe one day!
Very interesting! Maybe you have heard that ubisoft has shut down The Crew 1, an always online racing game that has an integrated offline mode not available for normal players. Could the same or a similar method be used to make this offline mode available?
Maybe, depends what is on the server and if any data needs to be pulled down to play
Missed your game hacking videos :(
New video is in the works on the game's protocol!
Reverse engineering love 😍
Excellent video
Glad you liked it!
Waiting for more videos from this series
They are coming!
@@247CTF 😍😍😍🥳🥳🥳👍👍👍
Did anyone ever notice the obfuscated cheats were from the base game? (From ancient memory it seems to align)
Awesome stuff!!
Thanks!
This is awesome ❤️ Thanks very much
No problem 👍
try reverse aegis
Can you show a bit more on how you use Binary Ninja? Not everyone is super familiar with the tool. Better yet would be to use a free alternative like Ghidra or Cutter
Binary ninja is free to use (at least it used to be..). In other videos I use ghidra, x64dbg, ollydbg, etc. Unfortunately, there is some assumed knowledge required to follow the content. I might put out more entry level content in the future!
could you pls share the software whic is used in video? thanks so much.
What timestamp?
@@247CTF 6min30s, pls
@@vati1011 binary.ninja/
MORE OF GAME HACKING PLEASE!
They're in the pipeline!
Is it possible to reverse engineer an old multiplayer game from like 2001 that has been offline for years to be able to bring a multiplayer server back, with little to no documentation?
Yes. Sounds like a tonne of work though.
@@247CTF I bet, wouldn't know where to start. So many dead games I'd love to bring back private servers for, for a niche audience obviously.
Which game?
@@MichaelPohoreski I have quite a few in mind to be fair. Conquer online is a good old game although I know private servers already exist.
I love video as well as call music theme in background . Could you give name of track?
The track is from streambeats: th-cam.com/video/BR8HgdmVDwQ/w-d-xo.html
Bro can you start from start ?
I only know C++ and Python( a little bit ) what else I need to know ?
If you know C++ and debugging you can follow this video
Please make more.
Very nice video mate keep up the good work , do ya recommend any resources to start learning how to reverse engineering because even so your video overall is well explain and understandable i still need to learn a lot lol
Reverse engineering is hard! I don't know of a single resource.. I suggest getting your hands dirty with some tools. For example, try and emulate what was done in this video and recreate the scripts to reverse the algorithm.
LOVE THIS SO MUCHHHHH
What environment are you running this tool?
Windows XP ☠️
@@247CTF what is so unique about this OS vs others in terms of running debugging tools that seek offsets?
Nothing at all, it's just a very old game which I couldn't get to play nice on newer versions of Windows!
@@247CTF Thank you so much for your answers! I am getting into the debugging world, and always nice too see there is humble folks out there willing to help.
bro thank you so much I can watch these instead of cs420
Enjoy!
@@247CTF thank you please make more videos
Will do!
yes more thanks bro
those graphics are nostalgic
wololo
just wow!!
🥳
thank for you interesting video, when i did it inversly, i get an error because the dictionary['A'] == dictionary['Q'] == '7868'
Hmm, yes I had the same error in my output too! Must have missed something in the assembly.. The function is kind enough to also encode everything you send it - so if you set a breakpoint on the function you can see what happens as an output when you send "QA" as an input!
I love it
oh yeah, me and this game are in the same age 🤞😹
🕹️
We want Moar videos
Will do!
11:04 why is it AUARRY and not QUARRY?
Well spotted! A bug in the deobfuscation script!
I hate this video 😠
wololololo I love this video 🤗
Wolololol
Team Olin
🤖
pretty sure i cant just watch this with zero knowledge on anything lol.
Have to start somewhere!
this is capitalism wtf
🤑