Advertisement

Reversing Statically-Linked Binaries with Function Signatures - bin 0x2D

Reversing Statically-Linked Binaries with Function Signatures - bin 0x2D Some Linux binaries are statically linked and it's more difficult to work with it. In this video we learn about FLIRT function signatures and use a Ghidra plugin to apply them. This will help us reverse engineer the binary.


-=[ 🔴 Stuff I use ]=-

→ Microphone:*
→ Graphics tablet:*
→ Camera#1 for streaming:*
→ Lens for streaming:*
→ Connect Camera#1 to PC:*
→ Camera#2 for electronics:*
→ Lens for macro shots:*
→ Keyboard:*
→ Headphones:*

-=[ ❤️ Support ]=-

→ per Video:
→ per Month:

-=[ 🐕 Social ]=-

→ Twitter:
→ Website:
→ Subreddit:
→ Facebook:

-=[ 📄 P.S. ]=-

All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

Live Overflow,liveoverflow,hacking tutorial,how to hack,exploit tutorial,statically linked,statically-linked,reverse engineering,linux,elf binaries,static linking,dynamic linking,flirt signatures,ida pro,ghidra,apply signature,libc sigs,

Post a Comment

0 Comments