Ghidra quickstart & tutorial: Solving a simple crackme

In this introduction to Ghidra we will solve a simple crackme - without reading any assembly!
Twitter: / ghidraninja
Links from the video:
Crackme: crackmes.one/crackme/5b8a37a4...
Download Ghidra: ghidra-sre.org
Scrolling issue: github.com/NationalSecurityAg...

Пікірлер: 267

  • @MrMasterRhythm
    @MrMasterRhythm5 жыл бұрын

    Please create a series of Reverse Engineering Basics! Love this!

  • @recklessroges
    @recklessroges5 жыл бұрын

    Its like the perfect purity of a man page was compiled into a perfect video. Instructions so clear I accidentally cracked the travelling knapsack problem.

  • @matthewnoel2781
    @matthewnoel27814 жыл бұрын

    4:07 "a small popup will show up." popup occupies most of screen.

  • @S00mbre
    @S00mbre5 жыл бұрын

    Crystal-clear, methodical and systematic walkthrough! Thank you!

  • @TheMadMagician87
    @TheMadMagician874 жыл бұрын

    Excellent explanation. Clear, concise and a great pace, wasn't confusingly fast or laboriously slow. I hope you continue to make videos on Ghidra.

  • @l1703
    @l17034 жыл бұрын

    wow this tutorial is just perfect, the pace the explanations, everything ! Thank you

  • @goosenp
    @goosenp5 жыл бұрын

    Brilliant "in a nutshell" tutorial of getting to know the program quickly. Could you please do a follow-up of the very same crack me, but with showing how you "crack" the crackme by patching the binary inside Ghidra so that it always jumps to the success condition regardless of the input given?

  • @gilperon

    @gilperon

    5 жыл бұрын

    Wow is that even possible with ghidra?

  • @zitronenwasser

    @zitronenwasser

    5 жыл бұрын

    Gil Bytepatching should be simple, worst case you just use like a Hex Editor and jump to the offset and manually patch ig

  • @hyronharrison8127

    @hyronharrison8127

    4 жыл бұрын

    @@gilperon its possible i. Gdb, i would hope so! :)

  • @willmcpherson2
    @willmcpherson23 жыл бұрын

    Beat tutorial I’ve ever seen. Clear, concise and simple.

  • @bv1495
    @bv14955 жыл бұрын

    Jesus you make it look so easy !! Love it ! Keep em coming my friend.

  • @edgeeffect
    @edgeeffect3 жыл бұрын

    I had a quick look at Ghidra a few weeks ago and it seemed rather complex.... It certainly seems a lot less complex now! Thanks.

  • @frankdai
    @frankdai5 жыл бұрын

    "Let's maximize the window" > Actually makes windows smaller

  • @ytxstream

    @ytxstream

    4 жыл бұрын

    And that's Mac OS for you

  • @Tedd755

    @Tedd755

    4 жыл бұрын

    @@ytxstream ⌘ + ⌥ + d is your friend

  • @The_Ballo

    @The_Ballo

    4 жыл бұрын

    @@ytxstream *Java's half-assed implementation of

  • @powershellaxp64

    @powershellaxp64

    4 жыл бұрын

    He actually just moved it to the right.

  • @soulife8383

    @soulife8383

    3 жыл бұрын

    ^^ effing owned dude... 😅 By a Polock Frank... sick digs

  • @andreww3575
    @andreww35755 жыл бұрын

    Fantastic. Hopefully looking forward to more of the same.

  • @juozasmiskinis3590
    @juozasmiskinis35905 жыл бұрын

    Thanks ninja! A very well prepared video. Hopefully more will come :)

  • @dzikibill6756
    @dzikibill67565 жыл бұрын

    I love it , already subscribed !

  • @user-qi6ig6gb8x
    @user-qi6ig6gb8x5 жыл бұрын

    Thank you Ghidra Ninja. You are a true Ninja!!

  • @namenone8387
    @namenone83874 жыл бұрын

    wow, nice introduction man. looking forward for more videos from you!

  • @theleopards4198
    @theleopards41985 жыл бұрын

    amazing man keep uploading ghidra tutorials

  • @nan6849
    @nan68493 жыл бұрын

    Thank you for a great overview. I'm getting started quite easily because of this 👍

  • @datenraffzahn6094
    @datenraffzahn60943 жыл бұрын

    Many thanks for suggesting this software ... I wanted to look into reverse engineering for years, but had not yet come across such an handy tool. AIDA wasn't really affordable for experimenting ... Again thank you very much!

  • @GajoFanatico
    @GajoFanatico4 жыл бұрын

    Excelent. We want more!! Really good tutorials

  • @TheChecklists
    @TheChecklists5 жыл бұрын

    Your videos are awesome! Please keep making content like this!

  • @TheUnusualSuspect101
    @TheUnusualSuspect1015 жыл бұрын

    awesome tutorial - keep them coming man!

  • @mitfreundlichengrussen1234
    @mitfreundlichengrussen12345 жыл бұрын

    Thank you - and pls. continue the work. PS: made me smile.

  • @abanjoplayer
    @abanjoplayer2 жыл бұрын

    This helped so much, the main thing I needed was just the fact that you can click on named functions in the decompile window to go to them. Seems obvious but I just didn't know!

  • @mohd1501
    @mohd15015 жыл бұрын

    Liked your explaination, easy and clear. Keep going please.

  • 3 жыл бұрын

    Love this. Keep up the great content man

  • @negritoojosclaros
    @negritoojosclaros4 ай бұрын

    very good video! Im already applying for NSA!

  • @jtw-r
    @jtw-r8 ай бұрын

    love the “NSA-Mainframe” on your terminal. I let out a good laugh at that!

  • @dsuess
    @dsuess2 жыл бұрын

    For future listeners, Ghidra is pronounced, "Gee-druh"; [3] /ˈɡiːdrə/[4]). Source: github.com/NationalSecurityAgency/ghidra/wiki/Frequently-asked-questions#how-do-you-pronounce-ghidra Great video, and well-explained usage. Keep up the great work.

  • @somedude5414

    @somedude5414

    2 жыл бұрын

    (Thank you classic Godzilla movies.)

  • @playnikko
    @playnikko4 жыл бұрын

    Great job explaining - thank you!

  • @heycherry100
    @heycherry1004 жыл бұрын

    Good and fast introduction!

  • @magi-bv7nd
    @magi-bv7nd2 ай бұрын

    very nice and efficient intro into ghidra gui

  • @AterNyctos
    @AterNyctos6 ай бұрын

    Extremely informative! Very good video!

  • @arieldelgadillo4674
    @arieldelgadillo46745 жыл бұрын

    Thanks man. I enjoyed you cracking that.

  • @frederick3524
    @frederick35244 жыл бұрын

    You have 13.2K subscribers and only 3 videos from 8 months ago! This was such a great video, I was disappointed to see you didn't have more content.

  • @tyrrelldavis9919

    @tyrrelldavis9919

    4 жыл бұрын

    Tech KZreadrs always have their view count scaled way down

  • @encryptedmind6952
    @encryptedmind69525 жыл бұрын

    awesome video man,keep doing more basic malware analyasis and reversing.Thanks:)

  • @drygordspellweaver8761
    @drygordspellweaver87612 жыл бұрын

    Very cool, I LOVE Ghidra so far

  • @valshaev1145
    @valshaev11454 жыл бұрын

    Nice introduction! Had have no idea abut Ghidra ;)

  • @MichaelJenkin
    @MichaelJenkin5 жыл бұрын

    Nice, I was looking for samples with known outcomes so I could follow the technique ! Awesome . (Mickyj Whitehat)

  • @cvspvr

    @cvspvr

    4 жыл бұрын

    you've literally got a black hat on. don't lie

  • @zraphy-veo5551
    @zraphy-veo55515 ай бұрын

    Oh my... this video is amazing! ❤

  • @NasirKhan-kh4zq
    @NasirKhan-kh4zq3 жыл бұрын

    Thanks for wonderful tutorial. Subscribed.

  • @0xm3trix
    @0xm3trix4 жыл бұрын

    The video was very helpful, keep it up bro👍👍

  • @osamazaid25
    @osamazaid255 жыл бұрын

    Great video. I learned a lot from it.

  • @userusms
    @userusms5 жыл бұрын

    Thank you for the nice tutorial!

  • @fade242black
    @fade242black5 жыл бұрын

    Great video. Keep it up!

  • @victors8718
    @victors87184 жыл бұрын

    That's a great tutorial man ,thx!

  • @SoCalRobb
    @SoCalRobb5 жыл бұрын

    Great content, subbed, keep them coming!

  • @XxManagedxX
    @XxManagedxX Жыл бұрын

    Excellent video! Is there a way to isolate and tag raw binary into separate chunks? For example if you read an EEPROM and load it in Ghidra as raw binary can you then split it up into prgrogram, data, etc so that decompiler can make sense of it?

  • @georgensa3942
    @georgensa39425 жыл бұрын

    love it bruh... keep it up

  • @SaintSaint
    @SaintSaint4 жыл бұрын

    Watched first 11 seconds. subscribed. I think I'm only subscribed to a dozen people after over a decade of being on KZread.

  • @Malaphor
    @Malaphor5 жыл бұрын

    "Just hit okay because nobody reads those anyway" Well, I guess I'm a nobody.

  • @EchoXIIIGO

    @EchoXIIIGO

    5 жыл бұрын

    You sir are a thought criminal reading those agreements... tut tut..

  • @MichaelJenkin

    @MichaelJenkin

    5 жыл бұрын

    @@EchoXIIIGO I do recall about 10 years ago, a very prominent software vendor had an Easter egg in the terms and conditions. something about giving away your first born and pledging elegance to satan. It took about 5 or more years for someone to finally read it and mention it. (Mickyj Whitehat)

  • @thatcrockpot1530

    @thatcrockpot1530

    4 жыл бұрын

    @benzo I highly doubt an opensource project would send data to the NSA, I feel like people are very aware of their role in the world, especially floss peeps.

  • @hexagonist23

    @hexagonist23

    4 жыл бұрын

    You must know what you are agreeing to before you agree.

  • @tomay3000
    @tomay30003 жыл бұрын

    Thank you, very instructive.

  • @gilperon
    @gilperon5 жыл бұрын

    Great Job! Keep up please.

  • @ColtonSpears
    @ColtonSpears5 жыл бұрын

    Looking forward to more videos like this.

  • @karimessalim
    @karimessalim5 жыл бұрын

    Great job

  • @nxxxxzn
    @nxxxxzn5 жыл бұрын

    very thorough. thanks

  • @osamaalbahrani
    @osamaalbahrani Жыл бұрын

    Great tutorial!

  • @happyked
    @happyked5 жыл бұрын

    Nice video! Do you plan on making more? Id love to see more videos on Ghidra :)

  • @gamingSlasher
    @gamingSlasher8 ай бұрын

    Very nice. Great tutorial.

  • @urnan7499
    @urnan74992 жыл бұрын

    Jidra 😞😭 didnt think that video would stress me out this much 🥶🥶🤯

  • @AtlasMTBRider
    @AtlasMTBRider5 жыл бұрын

    I remember solving that very same Crack me with Hopper. thanks for the video, I have not given GHIDRA a try yet. I'm still learning how to pronounce it correctly :)

  • @micah9382

    @micah9382

    5 жыл бұрын

    It is pronounced "Gee-druh" (github.com/NationalSecurityAgency/ghidra/wiki/Frequently-asked-questions#how-do-you-pronounce-ghidra), but that's okay. This video was a very nice introduction, by the way!

  • @NotAViper
    @NotAViper2 ай бұрын

    Very good tutorial

  • @TheUltimateLizard
    @TheUltimateLizard4 жыл бұрын

    Amazing tutorial

  • @pouncerminned863
    @pouncerminned8634 жыл бұрын

    Just curious as I just learned that this tool exists, what is difference using this vs ollydbg for cracking? Other than assembly

  • @VasaMusic438
    @VasaMusic4383 жыл бұрын

    great !!! Please, more !!!

  • @gabriels6425
    @gabriels64252 жыл бұрын

    Thank you for this video!

  • @varyktv
    @varyktv2 ай бұрын

    Great video! You explain things really simply. One question I have: can you use Ghidra to compare two similar .dll written in C++ files to find the differences between them?

  • @loremipsum5697
    @loremipsum56975 жыл бұрын

    THANK YOU FOR DOING GOD'S WORK!

  • @MySisterIsASlytherin
    @MySisterIsASlytherin3 жыл бұрын

    nice intro! of course, there's any number of possible solutions given that the only criterion is an @ in 5th position

  • @ashokvj8342
    @ashokvj83425 жыл бұрын

    Thanks man for the knowledge you are awsm

  • @kokop1107
    @kokop11075 жыл бұрын

    Great video. But could you make a video comparing Ghidra to IDA or some other RE tools?

  • @oliviern.2095
    @oliviern.20952 жыл бұрын

    Great, really great !

  • @nuszkat9953
    @nuszkat99534 жыл бұрын

    Waiting for more videos from you.

  • @AA-gl1dr
    @AA-gl1dr4 жыл бұрын

    Thank you so much!!!

  • @MiserableLemon
    @MiserableLemon5 жыл бұрын

    my terminal doesnt allow me to open the crack me initially, you said you're using a VM, is that a different terminal than mac's default?

  • @P-G-77
    @P-G-77 Жыл бұрын

    Love it.

  • @buzifalus
    @buzifalus2 жыл бұрын

    Great tutorial, kudos! Can you elaborate why is there an issue requiring the usage of a pointer to a pointer for argv ?

  • @retrograder3303

    @retrograder3303

    6 ай бұрын

    did you figure out? I am also curious

  • @geocine
    @geocine2 жыл бұрын

    are you planning on doing a course series for this? I would buy it

  • @ThiagoQwertyuiop
    @ThiagoQwertyuiop4 ай бұрын

    Thank you!

  • @SureshBhardwaj
    @SureshBhardwaj3 жыл бұрын

    cooooooooooooooooooooooooool Loved it!

  • @avtem
    @avtem11 ай бұрын

    Great video! Do you know how to hide the project window? i'd love to hide that window once i ran the code browser

  • @und3rgr0undfr34k
    @und3rgr0undfr34k5 жыл бұрын

    awesome!

  • @OthmanAlikhan
    @OthmanAlikhan2 жыл бұрын

    Thanks for the video =)

  • @jasonbourne7179
    @jasonbourne71794 жыл бұрын

    Approved for 100k.

  • @rfeil8443
    @rfeil84434 жыл бұрын

    Could you please make a tutorial on how to skirt the Mac OX Catalina 10.15.8 and download Ghidra? I really want to start using Ghidra but my mac will not allow the Javascript updates ...

  • @jaybailey216
    @jaybailey2162 жыл бұрын

    Kind of a dumb question but how did you get your keystrokes to show up on the screen like that?

  • @calmic9838
    @calmic98389 ай бұрын

    How are you able to run the Unix binary file. Im getting: ```zsh: exec format error: ./rev50_linux64-bit```

  • @chadiusmaximus9350
    @chadiusmaximus93505 жыл бұрын

    More tutorials please!!!

  • @anntakamaki1960
    @anntakamaki19608 ай бұрын

    Nice video, but I have a question. Is it possible to get the flag without putting the password? Since the flags stored somewhere within the file, right?

  • @DonaldOfEarth
    @DonaldOfEarth3 жыл бұрын

    Thanks for sharing! What do you use to show your keyboard input?

  • @stacksmashing

    @stacksmashing

    3 жыл бұрын

    It's a tool called Keycastr

  • @DurgaPrasadPandeyBCE

    @DurgaPrasadPandeyBCE

    3 жыл бұрын

    @@stacksmashing why am i getting this error ? /ghidraprojects/rev50_linux64-bit: cannot execute binary file

  • @10dragon456
    @10dragon4565 жыл бұрын

    What VM were you using during this video?

  • @stacksmashing

    @stacksmashing

    5 жыл бұрын

    None, I have a separate computer where I do this kind of stuff.

  • @jwdsoft
    @jwdsoft3 жыл бұрын

    I hope that you create a beginner series in reverse engineering embedded firmware

  • @pswalia2u
    @pswalia2u5 жыл бұрын

    awsome tutorial !! only issue why we changed char* argv[] to char **argv ??

  • @stacksmashing

    @stacksmashing

    5 жыл бұрын

    Because Ghidra unfortunately does not support [] in the function signature - so instead of saying 'this is a pointer to an array' we say 'this is a pointer to a pointer', which gives us the result we want :) (Simplified: Working with an array in C is basically just pointer-arithmetic in the background)

  • @k0tigrun
    @k0tigrun3 жыл бұрын

    What VM do you use for running Linux code in OSX?

  • @adnanearrassen6992
    @adnanearrassen69925 жыл бұрын

    nice

  • @bennguyen1313
    @bennguyen13134 жыл бұрын

    Is there a way to find what part(s) of the program are referencing a data-text string? I've tried doing a global search of the address, but where can I find the functions that use it? I've looked at the tutorial 'Z0FCourse_ReverseEngineering' from stryker2k2/ wolfshirtzlabs but don't see that covered! Very new to this, would OllyDbg or IdaPro be more beginner friendly?

  • @tyrrelldavis9919

    @tyrrelldavis9919

    4 жыл бұрын

    I'm a normie, no govlarp here, IDA is the only one I've heard of, Would be interesting to see how file analysis programs are built from scratch, as well as what language they would have to use to build a file analysis tool like ghidra or IDA Ghidra is kind of esoteric, IDA all the normies like me will recognize I know the govlarp people like using python

  • @SolomonUcko

    @SolomonUcko

    3 жыл бұрын

    There should be a list of "X-REFS" on the far right of the listing (you might need to scroll horizontally). There should also be a right-click option to show/list references.

  • @arabgunner06
    @arabgunner065 жыл бұрын

    What VM are you using to get that seamless terminal integration?

  • @stacksmashing

    @stacksmashing

    5 жыл бұрын

    It's an SSH session into the VM

  • @wintersgrass
    @wintersgrass5 жыл бұрын

    Could you do a little tutorial using a MSDOS 16bit binary file? Maybe something that's not packed?

  • @kawuschel1518
    @kawuschel15185 жыл бұрын

    Are you on a Mac or is this a Vbox

  • @achuthvp5257
    @achuthvp52574 жыл бұрын

    This was a great video. Amazing explanation but if you could speak a little louder and also put in some energy into your voice it would be even better