video thumbnail 13:34
Reversing Statically-Linked Binaries with Function Signatures - bin 0x2D

2019-12-04

[public] 41.9K views, 2.31K likes, 9.00 dislikes audio only

channel thumbLiveOverflow

Some Linux binaries are statically linked and it's more difficult to work with it. In this video we learn about FLIRT function signatures and use a Ghidra plugin to apply them. This will help us reverse engineer the binary.

-=[ ā¤ļø Support ]=-

→ per Video: https://www.patreon.com/join/liveoverflow

→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ šŸ• Social ]=-

→ Twitter: https://twitter.com/LiveOverflow/

→ Website: https://liveoverflow.com/

→ Subreddit: https://www.reddit.com/r/LiveOverflow/

→ Facebook: https://www.facebook.com/LiveOverflow/

-=[ šŸ“„ P.S. ]=-

All links with "*" are affiliate links.

LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.


Finding main() in Stripped Binary - bin 0x2C by LiveOverflow
/youtube/video/N1US3c6CpSw
Introduction
/youtube/video/CgGha_zLqlo?t=0
Example Binaries
/youtube/video/CgGha_zLqlo?t=65
Dynamic Approach
/youtube/video/CgGha_zLqlo?t=428
Function Signatures
/youtube/video/CgGha_zLqlo?t=522
Conclusion
/youtube/video/CgGha_zLqlo?t=734
LiveOverflow just a wannabe hacker... making videos about various IT security topics and participating in hacking competitions. -=[ ā¤ļø Support me ]=- Patreon per Video: https://www.patreon.com/join/liveoverflow YouTube Membership per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ šŸ“„ Imprint ]=- Security Flag GmbH Celsiusstr. 72 12207 Berlin Germany
/youtube/channel/UClcE-kVhqyiHCcjYwcpfj9w
I’m moving, no videos sorry 17,490 views
/youtube/video/9CS3q0uG1LI
Patreon patreon.com
https://www.patreon.com/join/liveoverflow
Binary Exploitation / Memory Corruption by LiveOverflow by LiveOverflow
/youtube/video/iyAyN3GFM7A