Can YOU Reverse Engineer this Simple Binary? (picoCTF 2023 "Reverse")
Ғылым және технология
In this video we reverse engineer a pretty simple ELF binary to find a flag! Learn about some basic static and dynamic analysis with gdb and other command-line tools!
Help support the channel with a like, comment & subscribe!
==== Social Media ====
🤖Discord: / discord
💻Blog: jasonturley.xyz/blog
🐔Twitter: / _jasonturley
🐙GitHub: github.com/JasonTurley
🔗LinkedIn: / jasonturley
®️ Reddit: / _jasonturley
==== Support ====
💖 Patreon: / jasonturley
☕BuyMeACoffee: www.buymeacoffee.com/jasonturley
🪙Donate Crypto: jasonturley.xyz/donate
==== Study Notes ====
eJPT certification cheat sheet: github.com/JasonTurley/eJPT
GXPN/SANS SEC660 course review: jasonturley.xyz/sans-sec660-g...
==== Music ====
“Easy Hike” by Yari
Пікірлер: 9
thanks for the amazing explanation man! looking foward for more ctf videos
@jasonturley
2 ай бұрын
Thank you! Glad you liked it!
Love all the explaining!! great video man, helped to understand some stuff ;D
@jasonturley
2 ай бұрын
Awesome! I’m happy the tangents help xD
Mac is using Mach-0 executable file format…
I really like this video, and the one where you give 3 tips to learn assembly. Your channel is really neat, and I'm really greatful those videos exist. :)
@jasonturley
6 ай бұрын
Thank you! I’m glad the videos are helpful!
Underrated channel keep it up
@jasonturley
8 ай бұрын
Thanks, will do!