This is a lecture from my 'Reverse Engineering with Radare2' course that is available here:
http://aetherlab.net/y/r2
You can check out my other courses here:
Website: http://aetherlab.net
Blog: / gergely.revay
Trainings:
Web Hacking: Become a Web Pentester - https://hackademy.aetherlab.net/p/web...
Learn Burp Suite, the Nr. 1 Web Hacking Tool - https://hackademy.aetherlab.net/p/bur...
Reverse Engineering with Radare2 - https://hackademy.aetherlab.net/p/rad...
Twitter: @geri_revay / geri_revay
Facebook: / aetherlab.net
===============================================
Transcript of the video:
===============================================
Hi,
In this quick lecture I will introduce our target program for this course.
To play around with radare we will use an application, which was aquired in a very dangeouros covert operation and it was extracted fom an R3 maintenance droid. We will analyse the binary to find out whether it can be useful for the rebellion.
Let's try to execute the application.
$ ./server.exe
Let see if it opens a port:
$ netstat -apnt
As you can see it does. Let’s connect to it, maybe we find something out:
$ nc localhost 14884
It seems to be somekind of server with login. Let's try to login.
It doesn't work.
So our first reverse engineering goal can be to bypass the login and get access to the application.
So this is gonna be our target. In th next lecture we will start working with radare, first by reviewing the config.