Scripting radare2 with python for dynamic analysis - TUMCTF 2016 Zwiebel part 2

Channel:
Subscribers:
921,000
Published on ● Video Link: https://www.youtube.com/watch?v=y69uIxU0eI8



Duration: 10:28
25,890 views
874


In part 1 we reverse engineered the algorithm, now we implement a radare2 script in python to recover the flag and defeat the encrypted code.

The code zwiebel.py: https://gist.github.com/LiveOverflow/3bd87ba4ffc48bda07d82eb4223911fa

-=[ πŸ”΄ Stuff I use ]=-

β†’ Microphone:* https://geni.us/ntg3b
β†’ Graphics tablet:* https://geni.us/wacom-intuos
β†’ Camera#1 for streaming:* https://geni.us/sony-camera
β†’ Lens for streaming:* https://geni.us/sony-lense
β†’ Connect Camera#1 to PC:* https://geni.us/cam-link
β†’ Keyboard:* https://geni.us/mech-keyboard
β†’ Old Microphone:* https://geni.us/mic-at2020usb

US Store Front:* https://www.amazon.com/shop/liveoverflow

-=[ ❀️ Support ]=-

β†’ per Video: https://www.patreon.com/join/liveoverflow
β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ πŸ• Social ]=-

β†’ Twitter: https://twitter.com/LiveOverflow/
β†’ Website: https://liveoverflow.com/
β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/
β†’ Facebook: https://www.facebook.com/LiveOverflow/

-=[ πŸ“„ P.S. ]=-

All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

#ReverseEngineering #Radare2 #CTF




Other Videos By LiveOverflow


2016-11-11int0x80 from DualCore lent me his lockpicking set and I'm a horse - BruCON CTF part 2
2016-11-08Simple reversing challenge and gaming the system - BruCON CTF part 1
2016-11-04The Heap: Once upon a free() - bin 0x17
2016-11-01The Browser is a very Confused Deputy - web 0x05
2016-10-28The Heap: How do use-after-free exploits work? - bin 0x16
2016-10-25What is CTF? An introduction to security Capture The Flag competitions
2016-10-21Explaining Dirty COW local root exploit - CVE-2016-5195
2016-10-18Channel is growing and Riscure hardware CTF starting soon - loopback 0x01
2016-10-14Sandbox bypass for the latest AngularJS version 1.5.8 - XSS with AngularJS 0x4
2016-10-11Live Hacking - Internetwache CTF 2016 - exp50, exp70, exp80
2016-10-06Scripting radare2 with python for dynamic analysis - TUMCTF 2016 Zwiebel part 2
2016-10-04Reverse Engineering with Binary Ninja and gdb a key checking algorithm - TUMCTF 2016 Zwiebel part 1
2016-09-30The Heap: How to exploit a Heap Overflow - bin 0x15
2016-09-27The Heap: what does malloc() do? - bin 0x14
2016-09-23CSRF Introduction and what is the Same-Origin Policy? - web 0x04
2016-09-19New Sandbox Bypass in 1.4.7 - XSS with AngularJS 0x3
2016-09-16Previous Bypass is now fixed in version 1.4.7 - XSS with AngularJS 0x2
2016-09-13XSS Contexts and some Chrome XSS Auditor tricks - web 0x03
2016-09-09Capturing & Analyzing Packets with Saleae Logic Pro 8 - Reverse Engineering A/C Remote part 2
2016-09-06Sandbox Bypass in Version 1.0.8 - XSS with AngularJS 0x1
2016-09-02Introducing the AngularJS Javascript Framework - XSS with AngularJS 0x00



Tags:
live hacking
live ctf
let's hack
hacking tutorial
how to hack
how to reverse engineer
radare2
r2pipe
scripting radare2
import r2pipe
tumctf
reverse engineering with radare2