Solving AVR reverse engineering challenge with radare2 - rhme2 Jumpy (reversing 100)

Channel:
Subscribers:
921,000
Published on ● Video Link: https://www.youtube.com/watch?v=zk3JdMOQPc8



Duration: 13:07
60,629 views
1,250


We are using radare2 together with avr-gdb and simavr to reverse engineer the challenge "Jumpy" which implemets a password checking algorithm.

(?s)lds r24[a-Z, 0-9;\.$^]+\n[a-Z, 0-9;\.$^โ”‚]+\n[a-Z, 0-9;\.$^โ”‚]+\n[a-Z, 0-9;\.$^โ”‚]+lds r24

Challenge files: https://github.com/Riscure/Rhme-2016
The .gdbinit from this video: https://github.com/cyrus-and/gdb-dashboard


-=[ ๐Ÿ”ด Stuff I use ]=-

โ†’ Microphone:* https://geni.us/ntg3b
โ†’ Graphics tablet:* https://geni.us/wacom-intuos
โ†’ Camera#1 for streaming:* https://geni.us/sony-camera
โ†’ Lens for streaming:* https://geni.us/sony-lense
โ†’ Connect Camera#1 to PC:* https://geni.us/cam-link
โ†’ Keyboard:* https://geni.us/mech-keyboard
โ†’ Old Microphone:* https://geni.us/mic-at2020usb

US Store Front:* https://www.amazon.com/shop/liveoverflow

-=[ โค๏ธ Support ]=-

โ†’ per Video: https://www.patreon.com/join/liveoverflow
โ†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ ๐Ÿ• Social ]=-

โ†’ Twitter: https://twitter.com/LiveOverflow/
โ†’ Website: https://liveoverflow.com/
โ†’ Subreddit: https://www.reddit.com/r/LiveOverflow/
โ†’ Facebook: https://www.facebook.com/LiveOverflow/

-=[ ๐Ÿ“„ P.S. ]=-

All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

#ReverseEngineering #CTF




Other Videos By LiveOverflow


2017-05-26RSA Power Analysis Side-Channel Attack - rhme2
2017-05-19Breaking ECDSA (Elliptic Curve Cryptography) - rhme2 Secure Filesystem v1.92r1 (crypto 150)
2017-05-12Reversing an unkown digital protocol with an Arduino - rhme2 Whac the mole (misc 200)
2017-05-05Blind Buffer Overflow exploitation to leak secret data - rhme2 Animals (pwn 200)
2017-05-02How (not) to ask a technical question
2017-04-28Format string exploit on an arduino - rhme2 Casino (pwn 150)
2017-04-21Recover RSA private key from public keys - rhme2 Key Server (crypto 200)
2017-04-14Defeat a stack cookie with bruteforce - rhme2 Photo manager (pwn 100)
2017-04-07Attacking an Electronic Combination Lock (ft. Electronics Idiot)
2017-03-31A day in the life of a pen-tester
2017-03-24Solving AVR reverse engineering challenge with radare2 - rhme2 Jumpy (reversing 100)
2017-03-17Start reverse engineering AVR - Memory Map and I/O Registers - rhme2 Reverse Engineering
2017-03-12What do Nintendo Switch and iOS 9.3 have in common? CVE-2016-4657 walk-through
2017-03-10SHA1 length extension attack on the Secure Filesystem - rhme2 Secure Filesystem (crypto 100)
2017-03-05Using UART / Serial to interact with an embedded device - rhme2 Setup
2017-03-03riscure embedded hardware CTF is over - loopback 0x03
2017-02-25Developing an intuition for binary exploitation - bin 0x20
2017-02-17Showing various security issue of the Wifi-Cloud Hub
2017-02-14GynvaelEN Hacking Livestreams and how stack cookies work
2017-02-10How safe is a Wifi Cloud Hub Router (from hackers)?
2017-02-03Bash injection without letters or numbers - 33c3ctf hohoho (misc 350)



Tags:
Live Overflow
liveoverflow
hacking tutorial
how to hack
exploit tutorial
avr
reverse engineering
rhme
rhme2
riscure
embedded hardware
ctf
capture the flag
hacking ctf
security ctf
reversing
arduino
arduino nano
reversing arduino
reverse engineering arduino
serial
uart