Загрузка...

Solving A Crackme Challenge Using Ghidra-Crackmes.one 0x05

In this video, I perform a full reverse-engineering walkthrough of a real CrackMe challenge from crackmes.one using Ghidra, GDB, and low-level binary analysis techniques.
No scripts, no shortcuts — just pure manual static & dynamic analysis, instruction tracing, breakpoint strategies, control-flow reconstruction, and deobfuscation.
---the crackmes: https://crackmes.one/crackme/67fa22568f555589f3530a94
---the script:

I break down the binary’s logic, detect hidden conditions, defeat simple obfuscation layers, analyze memory operations, inspect registers, and systematically isolate the validation routine.

This video demonstrates:

Disassembling & decompiling with Ghidra

Hunting for key functions and control-flow nodes

Detecting obfuscation patterns & dead branches

Dynamic debugging with breakpoints and stepping

Using GDB to inspect runtime behavior

Identifying strcmp-like routines, XOR operations, and custom checks

Reconstructing the correct input/key

Understanding how CrackMes implement anti-analysis tricks

If you're serious about reverse engineering, binary exploitation, or CTFs, this is mandatory material.
Enjoy the deep dive.

#reverseengineering
#ghidra
#gdb
#crackmes
#crackmesone
#binaryanalysis
#assembly
#assemblyx86
#x86_64
#disassembly
#ctf
#ctfchallenge
#ctfwriteup
#softwarecracking
#reverseengineer
#reversing
#debugging
#linuxreverseengineering
#lowlevel
#lowlevelprogramming
#systemprogramming
#malwareanalysis
#binaryexploitation
#obfuscation
#deobfuscation
#ghidratutorial
#gdbtutorial
#reverseengineeringcommunity
#reverseengineeringlife
#reverseengineeringworld
#ghidracode
#debugger
#staticanalysis
#dynamicanalysis
#reversingtools
#reversingcommunity
#reversingengineer
#executableanalysis
#binaryreverseengineering
#internals
#linuxinternals
#syscalls
#memoryanalysis
#controlflow
#programanalysis
#codeanalysis
#securityresearch
#securityengineering
#binaryresearch
#pwn
#pwning
#pwntools
#exploitdevelopment
#exploitdev
#reverseeng
#reverseengineeringtips
#reverseengineeringtutorial
#reverseengineering101
#analysis

Видео Solving A Crackme Challenge Using Ghidra-Crackmes.one 0x05 канала 『𝚂𝚎𝚐𝚏𝚊𝚞𝚕𝚝💀』
Яндекс.Метрика
Все заметки Новая заметка Страницу в заметки
Страницу в закладки Мои закладки
На информационно-развлекательном портале SALDA.WS применяются cookie-файлы. Нажимая кнопку Принять, вы подтверждаете свое согласие на их использование.
О CookiesНапомнить позжеПринять