- Популярные видео
- Авто
- Видео-блоги
- ДТП, аварии
- Для маленьких
- Еда, напитки
- Животные
- Закон и право
- Знаменитости
- Игры
- Искусство
- Комедии
- Красота, мода
- Кулинария, рецепты
- Люди
- Мото
- Музыка
- Мультфильмы
- Наука, технологии
- Новости
- Образование
- Политика
- Праздники
- Приколы
- Природа
- Происшествия
- Путешествия
- Развлечения
- Ржач
- Семья
- Сериалы
- Спорт
- Стиль жизни
- ТВ передачи
- Танцы
- Технологии
- Товары
- Ужасы
- Фильмы
- Шоу-бизнес
- Юмор
Solving A Crackme Challenge Using Ghidra-Crackmes.one 0x05
In this video, I perform a full reverse-engineering walkthrough of a real CrackMe challenge from crackmes.one using Ghidra, GDB, and low-level binary analysis techniques.
No scripts, no shortcuts — just pure manual static & dynamic analysis, instruction tracing, breakpoint strategies, control-flow reconstruction, and deobfuscation.
---the crackmes: https://crackmes.one/crackme/67fa22568f555589f3530a94
---the script:
I break down the binary’s logic, detect hidden conditions, defeat simple obfuscation layers, analyze memory operations, inspect registers, and systematically isolate the validation routine.
This video demonstrates:
Disassembling & decompiling with Ghidra
Hunting for key functions and control-flow nodes
Detecting obfuscation patterns & dead branches
Dynamic debugging with breakpoints and stepping
Using GDB to inspect runtime behavior
Identifying strcmp-like routines, XOR operations, and custom checks
Reconstructing the correct input/key
Understanding how CrackMes implement anti-analysis tricks
If you're serious about reverse engineering, binary exploitation, or CTFs, this is mandatory material.
Enjoy the deep dive.
#reverseengineering
#ghidra
#gdb
#crackmes
#crackmesone
#binaryanalysis
#assembly
#assemblyx86
#x86_64
#disassembly
#ctf
#ctfchallenge
#ctfwriteup
#softwarecracking
#reverseengineer
#reversing
#debugging
#linuxreverseengineering
#lowlevel
#lowlevelprogramming
#systemprogramming
#malwareanalysis
#binaryexploitation
#obfuscation
#deobfuscation
#ghidratutorial
#gdbtutorial
#reverseengineeringcommunity
#reverseengineeringlife
#reverseengineeringworld
#ghidracode
#debugger
#staticanalysis
#dynamicanalysis
#reversingtools
#reversingcommunity
#reversingengineer
#executableanalysis
#binaryreverseengineering
#internals
#linuxinternals
#syscalls
#memoryanalysis
#controlflow
#programanalysis
#codeanalysis
#securityresearch
#securityengineering
#binaryresearch
#pwn
#pwning
#pwntools
#exploitdevelopment
#exploitdev
#reverseeng
#reverseengineeringtips
#reverseengineeringtutorial
#reverseengineering101
#analysis
Видео Solving A Crackme Challenge Using Ghidra-Crackmes.one 0x05 канала 『𝚂𝚎𝚐𝚏𝚊𝚞𝚕𝚝💀』
No scripts, no shortcuts — just pure manual static & dynamic analysis, instruction tracing, breakpoint strategies, control-flow reconstruction, and deobfuscation.
---the crackmes: https://crackmes.one/crackme/67fa22568f555589f3530a94
---the script:
I break down the binary’s logic, detect hidden conditions, defeat simple obfuscation layers, analyze memory operations, inspect registers, and systematically isolate the validation routine.
This video demonstrates:
Disassembling & decompiling with Ghidra
Hunting for key functions and control-flow nodes
Detecting obfuscation patterns & dead branches
Dynamic debugging with breakpoints and stepping
Using GDB to inspect runtime behavior
Identifying strcmp-like routines, XOR operations, and custom checks
Reconstructing the correct input/key
Understanding how CrackMes implement anti-analysis tricks
If you're serious about reverse engineering, binary exploitation, or CTFs, this is mandatory material.
Enjoy the deep dive.
#reverseengineering
#ghidra
#gdb
#crackmes
#crackmesone
#binaryanalysis
#assembly
#assemblyx86
#x86_64
#disassembly
#ctf
#ctfchallenge
#ctfwriteup
#softwarecracking
#reverseengineer
#reversing
#debugging
#linuxreverseengineering
#lowlevel
#lowlevelprogramming
#systemprogramming
#malwareanalysis
#binaryexploitation
#obfuscation
#deobfuscation
#ghidratutorial
#gdbtutorial
#reverseengineeringcommunity
#reverseengineeringlife
#reverseengineeringworld
#ghidracode
#debugger
#staticanalysis
#dynamicanalysis
#reversingtools
#reversingcommunity
#reversingengineer
#executableanalysis
#binaryreverseengineering
#internals
#linuxinternals
#syscalls
#memoryanalysis
#controlflow
#programanalysis
#codeanalysis
#securityresearch
#securityengineering
#binaryresearch
#pwn
#pwning
#pwntools
#exploitdevelopment
#exploitdev
#reverseeng
#reverseengineeringtips
#reverseengineeringtutorial
#reverseengineering101
#analysis
Видео Solving A Crackme Challenge Using Ghidra-Crackmes.one 0x05 канала 『𝚂𝚎𝚐𝚏𝚊𝚞𝚕𝚝💀』
Reverse Engineering for Beginners Ghidra Beginner Tutorial How to Solve CrackMe CrackMe for Beginners Learn Binary Hacking Reverse Engineering Basics Ghidra Step by Step for Beginners Binary Analysis for Beginners CrackMe Walkthrough Beginner Learn Reverse Engineering Easily Reverse Engineering Reverse Engineering Tools Binary Exploitation Ghidra Reverse Engineering Reverse Engineering Demo CrackMe Solution Ghidra Tutorial Reverse Engineering Explained asm RE
Комментарии отсутствуют
Информация о видео
3 декабря 2025 г. 21:23:52
00:25:18
Другие видео канала




















