Reverse Hacking initial setup for Kali

Table of Contents

Here’s a step-by-step guide with links how do I setup my Kali using CryptoCat Binary Exploitation course.

For me it’s easier to install tools during the actual analysis process, so I invite you to create a C file first.

Example

For example you can copy that from the video:

#include <stdio.h>
#include <string.h>

int main(void)
{
    char buffer[16];

    printf("Give me the data: \n");
    gets(buffer);

    return 0;
}

To compile it:

gcc vuln.c -o vuln -fno-stack-protector-all -z execstack -no-pie

Checksec

Now, the first tool, which were introduced is checksec

Personally, I’ve installed it with apt

sudo apt-get -y install checksec
checksec --file=vuln

gdb-pwndbg

How to setup 3 different debuggers on top of GDB. I followed this tutorial;

Well actually I’ve just cloned the repo and run install.sh

And you can find the list of pwndbg features. But I think I need to search video for beginners :)

How to use pwndbg?

gdb-pwndbg
file vuln
info functions
disassemble main
break main
run
info stack
x $eax
p $eax
next
continue
delete breakpoints

Ghidra

Ghidra has been already installed in Kali, so I need only the script:

Copy paste ghidra.py script or download in your favourite way.

Ropper

sudo pip install filebytes
sudo pip install keystone-engine
sudo pip install ropper

Pwwntools

Here’s the manual how to install them. It has a docs as well there

Radare2

I haven’t installed it for now. But in case I need it, it’s here https://book.rada.re/first_steps/overview.html

Reference video