0x04 Target Application [Reversing with Radare2]

Опубликовано: 04 Июль 2019
на канале: ÆTHER SECURITY LAB
6,339
59

This is a lecture from my 'Reverse Engineering with Radare2' course that is available here:
http://aetherlab.net/y/r2

You can check out my other courses here:
Website: http://aetherlab.net
Blog:   / gergely.revay  
Trainings:
Web Hacking: Become a Web Pentester - https://hackademy.aetherlab.net/p/web...
Learn Burp Suite, the Nr. 1 Web Hacking Tool - https://hackademy.aetherlab.net/p/bur...
Reverse Engineering with Radare2 - https://hackademy.aetherlab.net/p/rad...
Twitter: @geri_revay   / geri_revay  
Facebook:   / aetherlab.net  

===============================================
Transcript of the video:
===============================================
Hi,

In this quick lecture I will introduce our target program for this course.
To play around with radare we will use an application, which was aquired in a very dangeouros covert operation and it was extracted fom an R3 maintenance droid. We will analyse the binary to find out whether it can be useful for the rebellion.
Let's try to execute the application.
$ ./server.exe

Let see if it opens a port:
$ netstat -apnt

As you can see it does. Let’s connect to it, maybe we find something out:
$ nc localhost 14884

It seems to be somekind of server with login. Let's try to login.

It doesn't work.
So our first reverse engineering goal can be to bypass the login and get access to the application.

So this is gonna be our target. In th next lecture we will start working with radare, first by reviewing the config.