Can YOU Reverse Engineer this Simple Binary? (picoCTF 2023 "Reverse")

Channel:
Subscribers:
3,600
Published on ● Video Link: https://www.youtube.com/watch?v=dRPr42XL61s



Duration: 11:47
290 views
24


In this video we reverse engineer a pretty simple ELF binary to find a flag! Learn about some basic static and dynamic analysis with gdb and other command-line tools!

Help support the channel with a like, comment & subscribe!

==== Social Media ====
🤖Discord: https://discord.gg/v2BVAUyj3P
💻Blog: https://jasonturley.xyz/blog
🐔Twitter: https://twitter.com/_jasonturley
🐙GitHub: https://github.com/JasonTurley
🔗LinkedIn: https://www.linkedin.com/in/jasonturley/
®️ Reddit: https://www.reddit.com/u/_jasonturley

==== Support ====
💖 Patreon: https://www.patreon.com/JasonTurley
☕BuyMeACoffee: https://www.buymeacoffee.com/jasonturley
🪙Donate Crypto: https://jasonturley.xyz/donate

==== Study Notes ====
eJPT certification cheat sheet: https://github.com/JasonTurley/eJPT
GXPN/SANS SEC660 course review: https://jasonturley.xyz/sans-sec660-gxpn-review/

==== Music ====
“Easy Hike” by Yari







Tags:
cyber security
beginners
picoctf
ctf
linux
bash
gdb