video thumbnail 13:07
Solving AVR reverse engineering challenge with radare2 - rhme2 Jumpy (reversing 100)

2017-03-24

[public] 51.3K views, 1.27K likes, 6.00 dislikes audio only

channel thumbLiveOverflow

We are using radare2 together with avr-gdb and simavr to reverse engineer the challenge "Jumpy" which implemets a password checking algorithm.

(?s)lds r24[a-Z, 0-9;\.$^]+\n[a-Z, 0-9;\.$^│]+\n[a-Z, 0-9;\.$^│]+\n[a-Z, 0-9;\.$^│]+lds r24

Challenge files: https://github.com/Riscure/Rhme-2016

The .gdbinit from this video: https://github.com/cyrus-and/gdb-dashboard

-=[ šŸ”“ Stuff I use ]=-

→ Microphone:* https://geni.us/ntg3b

→ Graphics tablet:* https://geni.us/wacom-intuos

→ Camera#1 for streaming:* https://geni.us/sony-camera

→ Lens for streaming:* https://geni.us/sony-lense

→ Connect Camera#1 to PC:* https://geni.us/cam-link

→ Keyboard:* https://geni.us/mech-keyboard

→ Old Microphone:* https://geni.us/mic-at2020usb

US Store Front:* https://www.amazon.com/shop/liveoverflow

-=[ ā¤ļø Support ]=-

→ per Video: https://www.patreon.com/join/liveoverflow

→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ šŸ• Social ]=-

→ Twitter: https://twitter.com/LiveOverflow/

→ Website: https://liveoverflow.com/

→ Subreddit: https://www.reddit.com/r/LiveOverflow/

→ Facebook: https://www.facebook.com/LiveOverflow/

-=[ šŸ“„ P.S. ]=-

All links with "*" are affiliate links.

LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

#ReverseEngineering #CTF


Start reverse engineering AVR - Memory Map and I/O Registers - rhme2 Reverse Engineering by LiveOverflow
/youtube/video/D0VKuZuuvW8
use a jumper on some of the pins of the arduino
/youtube/video/zk3JdMOQPc8?t=60.25
convert the binary file to an intel hex format
/youtube/video/zk3JdMOQPc8?t=148.66
print this assembly for a specific length
/youtube/video/zk3JdMOQPc8?t=298.48999
check the datasheet of the atmega
/youtube/video/zk3JdMOQPc8?t=368.60001
written into the uart buffer register
/youtube/video/zk3JdMOQPc8?t=384.17001
follow the cross-reference
/youtube/video/zk3JdMOQPc8?t=418.94
use the avr gdb to connect
/youtube/video/zk3JdMOQPc8?t=460.13
set a breakpoint
/youtube/video/zk3JdMOQPc8?t=467.509
set an error flag
/youtube/video/zk3JdMOQPc8?t=598.54999
set the arrow flag
/youtube/video/zk3JdMOQPc8?t=629.20001
LiveOverflow just a wannabe hacker... making videos about various IT security topics and participating in hacking competitions. -=[ ā¤ļø Support me ]=- Patreon per Video: https://www.patreon.com/join/liveoverflow YouTube Membership per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ šŸ“„ Imprint ]=- Security Flag GmbH Celsiusstr. 72 12207 Berlin Germany
/youtube/channel/UClcE-kVhqyiHCcjYwcpfj9w
I’m moving, no videos sorry 17,544 views
/youtube/video/9CS3q0uG1LI
Patreon patreon.com
https://www.patreon.com/join/liveoverflow
riscure Embedded Hardware CTF - RHme by LiveOverflow
/youtube/video/u_U6F2Kkbb0