Some Linux binaries are statically linked and it's more difficult to work with it. In this video we learn about FLIRT function signatures and use a Ghidra plugin to apply them. This will help us reverse engineer the binary.
-=[ 🔴 Stuff I use ]=-
→ Microphone:* → Graphics tablet:* → Camera#1 for streaming:* → Lens for streaming:* → Connect Camera#1 to PC:* → Camera#2 for electronics:* → Lens for macro shots:* → Keyboard:* → Headphones:*
-=[ ❤️ Support ]=-
→ per Video: → per Month:
-=[ 🐕 Social ]=-
→ Twitter: → Website: → Subreddit: → Facebook:
-=[ 📄 P.S. ]=-
All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
Live Overflow,liveoverflow,hacking tutorial,how to hack,exploit tutorial,statically linked,statically-linked,reverse engineering,linux,elf binaries,static linking,dynamic linking,flirt signatures,ida pro,ghidra,apply signature,libc sigs,
0 Comments