In the previous article we learned how to load a executable and do basic analysis in the radare2. This article is based on a picoCTF 2018 challenge "learn the gdb". If you read the article about gdb you might know it already. The file is here. Load it into the radare. r2 <filename>. Let's analyse … Continue reading Beginners guide to radare2-Part 2
Tag: reverse-engineering
Quick intro to GDB
GDB is a short for GNU debugger. Almost all *nix OSes comes with it. So if you are playing a ctf or want to debug something quickly GDB is the way. Today we are going to learn gdb by disassembling a simple program. A picoCTF 2018 problem. File is here. We have to get the … Continue reading Quick intro to GDB
Dip in to ATT syntax
There are 2 syntaxes that mainly used in reverse engineering. Intel and ATT. First I thought ATT was hard to read and Intel was a clean assembly syntax. But I was wrong. ATT reduces the time and abstraction by little changes in the code that It'll be easier for humans to read. This will be … Continue reading Dip in to ATT syntax
Beginners guide to radare2-Part 1
There are three giants in the reverse engineering world. radare2IDA ProGhidra IDA Pro has triumphed the reverse engineering universe as GUI capabilities and user-friendly interface it offers. Personally I don't like it because it has a huge price. So the options we open-sourced community have is Ghidra and radare2. Even though ghidra is used in … Continue reading Beginners guide to radare2-Part 1



