Anti-Flag [easy]: HackTheBox Reversing Challenge (binary patching with ghidra + pwntools)
Video walkthrough for retired HackTheBox (HTB) Reversing challenge "Anti-Flag" [easy]: "Flag? What's a flag?" - Includes binary patching with ghidra + pwntools! Hope you enjoy 🙂
↢Social Media↣
Twitter: https://twitter.com/_CryptoCat
GitHub: https://github.com/Crypto-Cat
HackTheBox: https://app.hackthebox.eu/profile/11897
LinkedIn: https://www.linkedin.com/in/cryptocat
Reddit: https://www.reddit.com/user/_CryptoCat23
YouTube: https://www.youtube.com/CryptoCat23
Twitch: https://www.twitch.tv/cryptocat23
↢HackTheBox↣
https://app.hackthebox.eu/challenges/Anti-Flag
↢Resources↣
https://ghidra.re/CheatSheet.html
https://cheatography.com/cactuarnation/cheat-sheets/gdb-and-pwndbg/
https://medium.com/@vignesh4303/reverse-engineering-resources-beginners-to-intermediate-guide-links-f64c207505ed
https://seblau.github.io/posts/linux-anti-debugging
https://reverseengineering.stackexchange.com/questions/25276/how-to-prevent-ghidra-from-removing-unreachable-blocks
https://materials.rangeforce.com/tutorial/2020/04/12/Patching-Binaries/
↢Chapters↣
Start - 0:00
Basic file checks - 0:20
Debug with ltrace - 1:00
Analyse in ghidra - 1:40
Solve with GDB-PwnDbg - 8:15
Bonus (Patch binary in ghidra) - 11:38
Bonus (Patch binary AGAIN with PwnTools) - 17:27
Видео Anti-Flag [easy]: HackTheBox Reversing Challenge (binary patching with ghidra + pwntools) канала CryptoCat
↢Social Media↣
Twitter: https://twitter.com/_CryptoCat
GitHub: https://github.com/Crypto-Cat
HackTheBox: https://app.hackthebox.eu/profile/11897
LinkedIn: https://www.linkedin.com/in/cryptocat
Reddit: https://www.reddit.com/user/_CryptoCat23
YouTube: https://www.youtube.com/CryptoCat23
Twitch: https://www.twitch.tv/cryptocat23
↢HackTheBox↣
https://app.hackthebox.eu/challenges/Anti-Flag
↢Resources↣
https://ghidra.re/CheatSheet.html
https://cheatography.com/cactuarnation/cheat-sheets/gdb-and-pwndbg/
https://medium.com/@vignesh4303/reverse-engineering-resources-beginners-to-intermediate-guide-links-f64c207505ed
https://seblau.github.io/posts/linux-anti-debugging
https://reverseengineering.stackexchange.com/questions/25276/how-to-prevent-ghidra-from-removing-unreachable-blocks
https://materials.rangeforce.com/tutorial/2020/04/12/Patching-Binaries/
↢Chapters↣
Start - 0:00
Basic file checks - 0:20
Debug with ltrace - 1:00
Analyse in ghidra - 1:40
Solve with GDB-PwnDbg - 8:15
Bonus (Patch binary in ghidra) - 11:38
Bonus (Patch binary AGAIN with PwnTools) - 17:27
Видео Anti-Flag [easy]: HackTheBox Reversing Challenge (binary patching with ghidra + pwntools) канала CryptoCat
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Ransom [easy]: HackTheBox Reversing Challenge (decrypt excel document)](https://i.ytimg.com/vi/7ev6Iq4gpTE/default.jpg)
![Patching BInaries with Ghidra](https://i.ytimg.com/vi/8U6JOQnOOkg/default.jpg)
![](https://i.ytimg.com/vi/xP3G_reYfHY/default.jpg)
![Google CTF: Beginner Quest: GATEKEEPER (Reverse Engineering)](https://i.ytimg.com/vi/bshuAGkgY3M/default.jpg)
![Intel [easy]: HackTheBox OSINT Challenge (opensource intelligence)](https://i.ytimg.com/vi/HazvdNA3KHM/default.jpg)
![Reversing and Cracking first simple Program - bin 0x05](https://i.ytimg.com/vi/VroEiMOJPm8/default.jpg)
![Reversing CrackMe with Ghidra (Part 1)](https://i.ytimg.com/vi/6p5Qviusskk/default.jpg)
![Web Challenge Walkthroughs - PicoCTF 2022 (BEGINNER-FRIENDLY Capture The Flag)](https://i.ytimg.com/vi/OUizLCfp9Dw/default.jpg)
![Tier 0: Redeemer - HackTheBox Starting Point - Full Walkthrough](https://i.ytimg.com/vi/usZ78an3jXE/default.jpg)
![Ransomware Analysis: 1 - WannaCry](https://i.ytimg.com/vi/Qh1LAbzzfBs/default.jpg)
![Emdee Five for Life [easy]: HackTheBox Misc Challenge (BeautifulSoup / Burp Intruder)](https://i.ytimg.com/vi/n0Dg-19DB9Y/default.jpg)
![Heap Exploit (ret2win) - "Hellbound" Pwn Challenge [HackTheBox Cyber Apocalypse CTF 2022]](https://i.ytimg.com/vi/U2OgL66-6BE/default.jpg)
![9: Overwriting Global Offset Table (GOT) Entries with printf() - Intro to Binary Exploitation (Pwn)](https://i.ytimg.com/vi/KgDeMJNK5BU/default.jpg)
![10: Bypassing Stack Canaries (leak + write) - Buffer Overflows - Intro to Binary Exploitation (Pwn)](https://i.ytimg.com/vi/TOImpHQvmpo/default.jpg)
![Impossible Password | Reversing Challenge of Hack The Box (HTB) solution using radare2](https://i.ytimg.com/vi/Tv6naW31A7c/default.jpg)
![Exploiting a Use-After-Free (UAF) Vulnerability - "Unsubscriptions Are Free" Pwn Challenge [PicoGym]](https://i.ytimg.com/vi/YGQAvJ__12k/default.jpg)
![Fuzzing GET Parameters with ffuf - "Flag in Space" Web Challenge [Space Heroes CTF 2022]](https://i.ytimg.com/vi/8oycV0Bsb5k/default.jpg)
![Baby Crypt [easy]: HackTheBox Reversing Challenge (XOR encryption)](https://i.ytimg.com/vi/ITD8CgzCkNw/default.jpg)
![Reverse Engineering (RE) Challenge Walkthroughs - PicoCTF 2022 (BEGINNER-FRIENDLY Capture The Flag)](https://i.ytimg.com/vi/l6Lt1sWZOUU/default.jpg)
![Tier 2: Base - HackTheBox Starting Point - Full Walkthrough](https://i.ytimg.com/vi/c407QmYzdM8/default.jpg)