TryHackMe ! Reverse Engineering // Use of Radar2 , GDB , Strings , ltrace ..
===================
Reverse Engineering
———————————–
This room focuses on teaching the basics of assembly through reverse engineering
————————————————————————-
Debugging and File Permission
In this task, we’ll be learning the basics of reverse engineering and assembly. Here are some important things to do before starting the task:
These files have been compiled with the lowest level of optimisation on Unix based machines and are intended to be run on Linux/Mac.
Make sure you set up a debugger – it would be good to get comfortable with radare2 which can be downloaded from here. You can also use other debuggers like gdb, which come installed in most Unix based operating systems.
When these files have been downloaded, change the permissions of these files using the command chmod +x filename
These tasks will make use of crackme files. The objective of these files is to understand the assembly code to uncover the right password for the file.
Here are some of the important things you will learn in this course:
If statements in assembly
Loops in assembly
standard function calls in assembly
Calling Convention in assembly
00:00-join room and download files
01:30-[Task 2] crackme1
This first crackme file will give you an introduction to if statements and basic function calling in assembly.
what is the correct password
03:35-[Task 3] crackme2
This is the second crackme file – Unlike the first file, this will involve examining registers, how and where values are compared
#1
What is the correct password?
07:07-[Task 4] crackme3
This crackme will be significantly more challenging – it involves learning how loops work, and how they are represented in assembly
#1
What are the first 3 letters of the correct password?
12:28-look little more about file
——————————-
#yesspider
please support me on patreon
https://www.patreon.com/yesspider
————————————————–
linux foundation