Aug 23, 2023

Reverse-Engineering — How Do Hackers Debug & Hack System Software/Services

Posted by in categories: cybercrime/malcode, education, robotics/AI

In this video i will show everyone the Theoretical & Practical side of understanding and learning Reverse-Engineering, to modify Machine-Code/Code overall in the Memory inside Binary Software Files on Systems, and also the Fundamentals about the System Architechture x64/x32-x86 Bit, as how it works in the smallest of Bits/Bytes form on the Memory-Layout Architechture. I will be showing a variety of Techniques like Cracking Games, Manipulating basic “Hello World” compiled C++ code Binary, and overall i will show different kind of Debugging/Reverse-Engineering Techniques on the Tool x64DBG.
- Educational Purposes Only.

If the Video was helpful and useful for learning Reverse-Engineering in a sense to understand Problematic Bugs/Vulnerabilities or Code in a Binary, subscribe for more videos!. Thanks.

Reverse-Engineering Tools:

Ghidra: // Mac OSX/Windows/Linux.
(Best for Static Analysis And Converting Assembly-code to C/C++)
IDA: // works on Mac OSX/Windows/Linux.
(Static & Dynamic Analysis)
x64DBG: // Windows.
(Static & Dynamic Analysis)
GDB: // Linux/Mac OSX/Windows/iOS/Android.
(Terminal-Based Static & Dynamic Analysis)
radare2: // Mac OSX/Windows/Linux.
(Recommened for Mac OSX) // Windows/Linux/Mac OSX/iOS/Android.
(Best For iOS/iPad/Apple Watch/.…Apple Systems)

Assembly Cheat-Sheet:
Learn & Understand Assembly:
Convert & Deconvert Assembly To Hex Or Vice-Versa:

Introduction 1: Assembly-Registers: 00:00
Introduction 2: Memory-Architecture: 07:53
Introduction 3: Machine-Code/Binary Data Segments: 12:47
Introduction 4: Stack & Heap Memory: 17:16

Leave a reply