Reverse Hacking initial setup for Kali
Table of Contents
Here’s a step-by-step guide with links how do I setup my Kali using CryptoCat Binary Exploitation course.
For me it’s easier to install tools during the actual analysis process, so I invite you to create a C file first.
Example
For example you can copy that from the video:
#include <stdio.h>
#include <string.h>
int main(void)
{
char buffer[16];
printf("Give me the data: \n");
gets(buffer);
return 0;
}
To compile it:
gcc vuln.c -o vuln -fno-stack-protector-all -z execstack -no-pie
Checksec
Now, the first tool, which were introduced is checksec
Personally, I’ve installed it with apt
sudo apt-get -y install checksec
checksec --file=vuln
gdb-pwndbg
How to setup 3 different debuggers on top of GDB. I followed this tutorial;
Well actually I’ve just cloned the repo and run install.sh
And you can find the list of pwndbg features. But I think I need to search video for beginners :)
How to use pwndbg?
gdb-pwndbg
file vuln
info functions
disassemble main
break main
run
info stack
x $eax
p $eax
next
continue
delete breakpoints
Ghidra
Ghidra has been already installed in Kali, so I need only the script:
Copy paste ghidra.py script or download in your favourite way.
Ropper
sudo pip install filebytes
sudo pip install keystone-engine
sudo pip install ropper
Pwwntools
Here’s the manual how to install them. It has a docs as well there
Radare2
I haven’t installed it for now. But in case I need it, it’s here https://book.rada.re/first_steps/overview.html
Reference video