In this video we analyse the decompilation output for binaries with and without various stack smashing protections (Fortify checks, Stack Guard) and work out how to use Ghidra’s awesome function diffing tool.
⚔️ Stack smashing protection
⚔️ Ghidra
⚔️ Decompilation
⚔️ Visual function diffing
Code from the video:
Ø
—————————————————————————————————
Follow us on Twitter :
Github :
If you liked this video and you want to learn hands-on how to analyse malware threats, with real samples and practical exercises, find us on Udemy :
—————————————————————————————————
Want to support us continue to make great content? Buy us a coffee :
Thank you ?
source