Posted on Wednesday, 4th December 2019 by Michael
CTF Minute Episode 4: Basic Binary Analysis methodology: Looking at using tools such as strings, XXD, and Ghidra to gain fast points in the basic binary analysis ctf rounds
CTF Minute is a video serious to introduce you to new tools, techniques, and tricks for CTF’s and security testing in general. These are short videos to quickly introduce you to these new topics. In this video, we are going to look at basic binary analysis to score fast points in CTF challenges. While this vide is geared at CTF’s this will work in some real-world testing as well. We will look at using common tools such as strings and XXD and go more in-depth with the NSA Ghidra to disassemble the code and look at the assembly data section to find the initialized flag.
Hacker Swag:
https://teespring.com/stores/digitaloffensive-store Code: Youtube for 10% off
Books to help pass the OSCP / Study
Penetration Testing: A hands on introduction to hacking: https://amzn.to/34UEX8O
Hackers Handbook version 3: A guide to practical penetration testing: https://amzn.to/2QiXHeI
Videos to help pass the OSCP / Study
Path to OSCP Video list: https://www.youtube.com/watch?v=yhdo2BySkes&list=PLlKCm0eusyjMuWGMV5jwT3aeDW0hbZa7k
Buffer overflow Made easy: https://www.youtube.com/watch?v=cr4m_-fC90Q&t=1570s
OSCE Prep Books:
Gear used to make this video:
Final cut pro X: https://amzn.to/32Y6ofR
MacBook Pro: https://amzn.to/2CQJk7Y
VmWare Fusion: https://amzn.to/2r28jCM
Social Media:
Twitter: https://twitter.com/genxweb
LinkedIn: https://www.linkedin.com/in/michael-lasalvia-7743732/
YouTube: https://www.youtube.com/user/genxweb
Path to OSCP Series:
Note some of the links above are affiliates and I may receive a small commission of any sales.
Posted in OSCP | Comments (0)