Can YOU Reverse Engineer this Simple Binary? (picoCTF 2023 "Reverse")

Ғылым және технология

In this video we reverse engineer a pretty simple ELF binary to find a flag! Learn about some basic static and dynamic analysis with gdb and other command-line tools!
Help support the channel with a like, comment & subscribe!
==== Social Media ====
🤖Discord: / discord
💻Blog: jasonturley.xyz/blog
🐔Twitter: / _jasonturley
🐙GitHub: github.com/JasonTurley
🔗LinkedIn: / jasonturley
®️ Reddit: / _jasonturley
==== Support ====
💖 Patreon: / jasonturley
☕BuyMeACoffee: www.buymeacoffee.com/jasonturley
🪙Donate Crypto: jasonturley.xyz/donate
==== Study Notes ====
eJPT certification cheat sheet: github.com/JasonTurley/eJPT
GXPN/SANS SEC660 course review: jasonturley.xyz/sans-sec660-g...
==== Music ====
“Easy Hike” by Yari

Пікірлер: 9

  • @weijietan1178
    @weijietan11782 ай бұрын

    thanks for the amazing explanation man! looking foward for more ctf videos

  • @jasonturley

    @jasonturley

    2 ай бұрын

    Thank you! Glad you liked it!

  • @akanemishiro2715
    @akanemishiro27152 ай бұрын

    Love all the explaining!! great video man, helped to understand some stuff ;D

  • @jasonturley

    @jasonturley

    2 ай бұрын

    Awesome! I’m happy the tangents help xD

  • @TomCarbon
    @TomCarbon2 ай бұрын

    Mac is using Mach-0 executable file format…

  • @Ximaz-
    @Ximaz-7 ай бұрын

    I really like this video, and the one where you give 3 tips to learn assembly. Your channel is really neat, and I'm really greatful those videos exist. :)

  • @jasonturley

    @jasonturley

    6 ай бұрын

    Thank you! I’m glad the videos are helpful!

  • @jpv1337
    @jpv13379 ай бұрын

    Underrated channel keep it up

  • @jasonturley

    @jasonturley

    8 ай бұрын

    Thanks, will do!

Келесі