Getting Started Reversing C++ Objects with Ghidra - Ghidra Reversing Tutorials
Описание
In this video series, Ghidra Reversing Tutorials, we'll take a look at several sample programs that use C++ objects, compile them from source and then reverse engineer them with Ghidra. Our goals will be to identify when the objects are created, recognize the size/structure of the memory allocation and how it's used by the object and explore the use of virtual functions and virtual function tables. Recognizing the use of C++ objects is helpful a variety of reverse engineering activities, to include malware analysis and software exploitation. This will be the first in a series of videos exploring the reverse engineering of object-oriented languages.
Looking for full cyber security courses? Check out my courses on Pluralsight! https://www.pluralsight.com/authors/josh-stroschein
Part 1 - Reversing Looping Control Structures - Ghidra Reversing Tutorials https://youtu.be/Y2qd0m4_4ZM
Part 2 - Reversing Array Data Structures - Ghidra Reversing Tutorials https://youtu.be/eNxckomOing
Part 3 - Reversing Structures - Ghidra Reversing Tutorials https://youtu.be/ntTV8V7KVco
Part 4 - Understanding Calling Conventions - Ghidra Reversing Tutorials https://youtu.be/FPIr4fGI8lw
Part 5 - Getting Started Reversing C++ Objects with Ghidra - Ghidra Reversing Tutorials https://youtu.be/ir2B1trR0fE
Part 6 - Inheritance and Polymorphism in C++ - Ghidra Reversing Tutorials https://youtu.be/MiX4p2l_IE0
Source code can be found on my Github: https://github.com/jstrosch/learning-reverse-engineering/tree/master/C%2B%2B%20Objects
Рекомендуемые видео



















