Anonymous ID: 598f64 May 4, 2020, 9:57 p.m. No.9034263   🗄️.is 🔗kun

https://www.youtube.com/watch?v=ir2B1trR0fE&t=584s

 

Recognizing the use of C++ objects is helpful a variety of reverse engineering activities, to include malware analysis and software exploitation. This will be the first in a series of videos exploring the reverse engineering of object-oriented languages.

Anonymous ID: 598f64 May 4, 2020, 10:07 p.m. No.9034389   🗄️.is 🔗kun   >>4449

https://threatpost.com/bug-in-nsas-ghidra/148787/

Despite the warning, researchers are downplaying the impact of the bug. They maintain conditions needed to exploit the flaw, tracked as CVE-2019-16941, are rare.

Anonymous ID: 598f64 May 4, 2020, 10:09 p.m. No.9034426   🗄️.is 🔗kun

https://www.csoonline.com/article/3393246/how-to-get-started-using-ghidra-the-free-reverse-engineering-tool.html

 

This reporter, who has no previous reverse engineering experience, was able to get Ghidra up and running in less than an hour, and was editing assembly and recompiling binaries with little trouble.

Anonymous ID: 598f64 May 4, 2020, 10:19 p.m. No.9034546   🗄️.is 🔗kun

https://www.csoonline.com/article/3393246/how-to-get-started-using-ghidra-the-free-reverse-engineering-tool.html

 

We found getting started with Ghidra to be quite easy, although mastery of reverse engineering as a discipline has a steep learning curve. Beginners new to reverse engineering will find numerous "crackmes" online, binaries built as training tools for self-study beginner reverse engineers. Plenty of crackme tutorials and walkthroughs are available for those with the Google-fu to find them.

 

Beginner programming experience helpful. Knowledge of C useful. Some assembly required.