hobune Channels Contact About Donate

Reverse engineering with #Ghidra: Breaking an embedded firmware encryption scheme

Back to video page | Download comments jsonl

Comments (archived 2022-07-02 21:13; 142 top, 170 total comments)

Lorem Ipsum 2019-03-14 19:38:57

Very impressed by the quality of the tutorial.Clear, concice, straight to the point how I like em'. Ghidra truly is a powerful tool but once again in the hands of a capable person it is even better. Also, that encrypted firmware had no chance at all, when the key and the booty is in the hand of the attacker it's only a matter of time! No amount of obfuscation can change that simple fact.

169 likes
Replies (4)
John Woods 2019-03-20 11:55:56

What is a better way to do this? Clearly not having the key inside the bin, what's better practice?

4 likes
174gjc 2019-03-21 06:17:33

@John Woods Don't bother encrypting anything that's entirely controlled by an attacker- it's just obfuscation. You could use some sort of online method of getting the key from a central server, but even then it wouldn't be perfect.

7 likes
TheGame402 2019-04-11 15:15:23

@John Woods In this case the correct solution would have been to have the key inside the device in some place that does not get overwritten by a firmware upgrade. That way you don't have to ship the decryption key with new firmware. They are just idiots.

9 likes
Tunahan Karatay 2021-05-12 14:48:00

@TheGame402 That too only takes one person with electronical hacking knowledge. The worst part is that once the key gets shared online, you cannot change it because it is hard coded in all devices.

1 like
Reckless Roges 2019-04-04 09:13:44

Its nice to see some real hacking being done by someone that is good at it. You are also a really good teacher; clear and well paced, showing your mastery of the subject.

33 likes
goosenp 2019-03-28 18:41:56

Wow, this tutorial is of amazing quality!

Since Ghidra is quite a new tool, it is quite difficult to find resources on it, so you're really doing the community an amazing service. This video made me subscribe.
I'm having trouble finding a resource on how to using Ghidra for embedded firmware which isn't unix based. (No MMU, just bare metal firmware) Liveoverflow did quite an interesting series on the STM32-based legder wallet, could you please point me to a resource on analysing the same type of embedded device with Ghidra?

39 likes
Replies (1)
2000 sùbs challenge 2019-07-25 01:02:42

hi from liveoverflow ,which new tool do you know so far ,i need more knoledge

0 likes
BioDevM 2019-04-06 19:07:40

"You should definitely make a video about reverse engineering basics"

158 likes
Replies (2)
Muhammad Fadhlan 2020-05-18 05:09:09

yes

1 like
Rahmat Hidayah 2021-11-08 15:04:17

It's been awhile

1 like
Is This a Matrix 2019-03-15 02:52:22

This video is PAAACKED with great info. Keep them coming!

94 likes
RmFrZQ 2019-04-04 18:17:55

It was very interesting to watch the workflow and what programs were used to achieve the final goal.
I'm looking to get back into reversing, but I became too rusty and there is a ton of new programs, tools and techniques that I know nothing about.


I remember having fun with MSVS6, Cracker's Kit and OllyDbg on Windows XP. Those days seems so distant now..

8 likes
Anders P 2019-07-31 15:48:18

The AES functions in the library does not use padding. So when running openssl from command line you have to use ”-nopad” to get the last 16 bytes (and avoid the error message).
Your key is also two zero bytes too short ”0000” (from the python script), but openssl will pad the key with zero bytes so it works anyway.

2 likes
santasl 2019-03-31 07:13:55

Very helpful video. I now see why my previous attempts understand reverse engineering were bound to fail. My way of approaching such a problem where not because I have only limit knowledge about x86 assembler - although that probably doesnt help either - it was more a misunderstanding of how to use the decompilation view. Thanks for this video, and I'm looking forward to the next videos

6 likes
C. Darwin 2021-02-04 20:02:36

Amazing video. You make it easy to follow by being precise, and "answering" questions that may pop up as I watch it. Your videos are really packed with great information. I learned a lot. Thank you.

0 likes
青空 2019-03-22 03:49:15

Amazing! I'm happy to see some comprehensive coverage of Ghidra. This is packed full of useful information for Ghidra. Being familiar with reversing only gets you so far with a given program.

4 likes
Irshad Ahamed 2020-05-21 21:15:15

That's really impressive. Thank you for walking us through.

1 like
Evidence Monday 2020-06-11 12:28:44

Wonderful video. From what I see you've spent a great deal of time studying the firmware. Some basics on how you go about reverse engineering would be really helpful. Thanks.

0 likes
Christopher Walters 2021-03-23 15:34:22

I came to crack software, stayed for the full tutorial series. Really great stuff.

1 like
Larry Gall 2019-04-01 20:58:54

That was wonderful. I enjoyed watching this video as I was able to stay with it quite well. I was wondering how someone like yourself would approach disk encryption, like say, Veracrypt. What would be involved with that? If you had control of a machine, logged into Windows, with dismounted partitions.. could there be a way to decrypt? Thanks.

0 likes
Mammetun 2019-03-20 08:41:07

Excellent video and great channel!! Thank you for sharing your knowledge with us who are not yet experts in this matters. Golden things to learn here :)

3 likes
Kosmas Raptis 2021-11-15 18:57:32

This guy deserves more recognition! Extremely skilled! Subbed!

0 likes
Rockford the Roe 2020-03-23 06:40:26

I'm a APCSA student with no experience with reverse engineering, this sounds like something very fun I can do and learn while quarantined.

1 like
DummybugStudios 2021-04-02 15:26:55

I'm here from LiveOverflow's channel and I'm loving your content. Please make more of this stuff! :D

4 likes
Replies (1)
stacksmashing 2021-04-02 15:56:58

Welcome on board 😀

2 likes
George NSA 2019-03-14 16:34:39

this is love dude...
you are awesome just keep them coming
Hope you explain some router firmware reversing and explaination for how these hackers are now exploiting the routers on a very large scale.
Thnaks in advance :)

23 likes
TheMadMagician87 2019-10-14 06:22:40

Wow, great to see how this sort of stuff is done. Subscribed and look forward to checking out some of your other videos!

0 likes
Nico Blujim 2019-03-15 22:11:42

Great Work here!
Hope there will come more in the future! Very good explained and ez to follow.

7 likes
Replies (1)
Nico Blujim 2019-03-16 12:27:31 (edited 2019-03-16 12:27:54 )

Also a short question: Your accent sounds familiar to me. Are you from germany?
If i'm right: Schöne Grüße aus Bayern! Sehr gut erklärte Videos, denen auch sicher Leute folgen könnten, die bis jetzt noch kaum etwas in die Richtung gemacht haben. Hoffe da kommen noch ein paar mehr Videos! Was bringt mir all mein Wissen, wenn ich es nicht verständlich äußern kann. Wirklich gut ist man erst in einem Thema, wenn man die komplexeren Vorgänge simpel erklären kann. Und das kannst du auf jeden Fall!
And maybe you could start a Discordserver for your followers. That would help to build a community:) @Ghidra Ninja

1 like
Andrew Shatnyy 2020-11-04 12:24:07

Unbelievable quality of the content. Massive thanks, mate!

3 likes
Algorhythm 2019-04-03 19:18:19

I'll in love with your channel! Please create a series of Reverse Engineering Basics!

10 likes
Karl Kox 2020-12-23 14:20:06

As a user of Idea and doing some RE for time to time, this is very impressive !
All seems so easy but it is not.

1 like
CureofQuarantine 2020-11-19 07:56:40

Gateway to shell :D Good job Thomas, love the work you put in!!

Sorry a bit late :(

1 like
Abdallah Hadjallah 2019-07-13 01:46:24

Wow it was so great,i am really fascinated by your method, i hope that soon as you can "please" make videos about reverse engineering basics, and maybe other things also !! big thanks <3 :)

0 likes
SHREATEH 2019-08-27 10:43:30 (edited 2019-08-27 10:44:41 )

thank you for your videos, its good if we can see more of your videos about CTF binary reverse. and please make your videos more easy to understand for beginners . thank you

0 likes
Péter Váraljai 2019-03-24 08:41:19

I love your work! Nice and easy to understand. I looking forward your future videos.

3 likes
Lostinmyway 2019-05-28 21:36:51

Dude, please uploads more videos, you cannot imagine how we appreciate your videos. Thank you very much

1 like
Valentin Bersier 2021-02-05 12:40:28

Discovered your channel a couple of days ago and I'm loving the content! Regarding binwalk on macOS, I managed to install it with homebrew but it complains about failing to run external extractor unsquashfs, with several errors regarding squashfs-root, sasquatch etc. How did you get it running on macOS without errors? Or are you running a linux subsystem? Thanks in advance

0 likes
Jakob Cranium 2019-03-21 15:40:09

This video is great. Alongside LiveOverflow one of the best RE videos on Youtube! Keep them coming.

3 likes
Fatih Gul 2019-03-21 04:17:36

Your videos are really very good. Thank you for them and please continue for new ones 👍🏻

3 likes
Karl Gohlke 2019-04-03 11:49:30

wow - perfect example of a very skilled knowledge/intension mix. Thx for the work and sharing.

2 likes
Gummy Ballz 2020-05-31 20:34:00

Sir. Not very many are able to articulate a lesson in a way my brain to absorb. Especially when it comes to variables in dialect. All said it can be frustrating at times. While I am going to have to rewatch this I would personally like to thank you for your time as well as your ability to clearly lay it out... I will mos def look for more of your tutorials

0 likes
asdf 2019-03-18 06:28:50

Awesome, love the information.
Your channel is great, hoping to see more of these in the future.

2 likes
Toffees 2019-03-19 13:47:16

Question: when you were renaming variables, how did you establish that auStack48 was actually the userkey?

2 likes
Replies (1)
Toffees 2019-03-19 13:49:03

ahh forget it. I just realise you had looked at the function signature.

2 likes
ollopa1 2019-03-19 09:20:54

This is really helpful for understanding the Ghidra workflow. Thanks!

2 likes
Anthony Manno 2019-11-19 19:31:38

Awesome video...great information. What would you have done if you did not have access to the older firmware version, would this still be possible, just much harder?

0 likes
Jordan Ferraris 2021-11-02 22:38:56

Wonderful video. I noticed that the firmware for 1.11 is not on the site from what I see anymore? Can't really follow along in the video without that older update, is there a way you could link it so people could still follow along? Thank you, such great content!

0 likes
western vibes 2020-05-21 08:05:26

Mate could you make more firmware hacking videos please. This is sick !!

0 likes
MostDefinitelyNotA Troll 2019-03-23 13:43:00 (edited 2019-03-23 13:49:36 )

As others already have said this video is very informative and in good quality. Good job!
I guess you are German? How did you learn all of this?

5 likes
Morten Kristiansen 2019-04-20 10:27:39

So glad I took the extra effort to put in security from the beginning in the firmware update system I've designed.

0 likes
JustForYoutube 2019-03-14 22:34:54

this is a high level of reverse engineering !
like + subscribe

11 likes
NameIst Unbekannt 2019-04-18 19:51:50

Insider here: We know that the encryption is very basic and rather embarassing. We don't want to make it too easy, but we also know that even the "hardest encryption" will be cracked if enough time is invested. So this is the middle way..
Nice video, thanks for the tips!

1 like
Replies (3)
kartoffelwaffel 2019-04-21 12:45:38

Embedded engineer here, you guys hiring?

0 likes
NameIst Unbekannt 2019-04-22 12:55:40

@kartoffelwaffel This is an anonymous account, sorry.

0 likes
kartoffelwaffel 2019-04-22 13:27:16

@NameIst Unbekannt As implied by your name, no worries!

1 like
John Doe 2021-07-06 11:40:23

So basically if they release a new version of this hardware, and implement the encrypted firmware from the factory, you would not be able to do this. (And offcourse, they should change the key to something else, than the one you showed)

0 likes
Michael Cohen 2019-04-23 02:34:22

Really great video and good explanation. Thanks you so much for it...

0 likes
TheJuli1241 2019-04-04 13:10:02

Id die to watch a reverse engineering basics tutorial. I was hooked just by watching for 2 minutes

2 likes
Carlos Diaz 2019-03-15 05:09:12

For a moment I thought you are the presenter of SCADA: Gateway to shell from a CCC talk. Impressive work and video quality!

4 likes
Replies (1)
stacksmashing 2019-03-15 12:24:55

🤫Thank you!

2 likes
William 2019-03-24 03:08:42

This video was so good, very well explained

3 likes
chat perlipopète 2022-01-19 21:10:18

Hi, very good tutorial indeed yet I'm not able to replay it as, the firmware files are'nt available anymore from Moxa. did you make a copy of the cited files or do you know were I can get them ? best

0 likes
Steve Naathan 2019-04-27 14:07:50

awesome video, really loved it. I'm very excited about the upcoming post on finding a vuln in the device.

0 likes
Искандер Шафиков 2019-04-02 01:01:28

Can't wait to see more of your Ghidra videos!

1 like
ThePandaGuitar 2019-03-18 04:53:43

Wow! Thank you so much for such high quality video. Subscribed! Please keep going.

1 like
Emre Alsancak 2019-11-27 13:06:27

Incredible tutorial!

0 likes
dumbasPL 2019-03-18 22:49:02

Do you do any other stuff? I would happily see some of it no matter what it is. You are awesome.

2 likes
Replies (1)
stacksmashing 2019-03-20 16:59:28

Definitely in the future!

2 likes
Marius K. 2019-03-21 21:10:08

you are amazing man, i really hope u keep going with this

1 like
cherry 2020-04-06 02:49:20

I'm watching all of your videos, very good content!

0 likes
ctf rookie 2019-03-20 23:38:45

Woah, Man, that was awesome. I cant wait to see more from You!

0 likes
Matteo O 2020-03-13 08:55:45

Really nice video. I only hope that now you can upload more often.

0 likes
Paprika 2019-03-25 21:32:05

Thank you for these tutorials!

1 like
usopenplayer 2019-03-14 20:36:40

Many thanks to Ghidra Ninja and the NSA!

7 likes
Rainer Zufall 2019-03-23 02:12:05

Great video, thank you very much!

3 likes
GCM 2020-02-04 18:06:18

Does finding something like this warrant a CVE to the researcher?

0 likes
Sosa Info Tech 2019-04-06 07:44:43

Wow that was awesome 😊

1 like
Lino Nava 2020-05-31 18:46:02

great and amazing tutorial

0 likes
Tareque Md Hanif 2020-02-11 08:18:16

I love this tool! ❤️❤️❤️

0 likes
AbdElaziz Saad 2021-02-28 16:36:22 (edited 2021-02-28 16:36:39 )

This is so great.
Keep it up.

0 likes
OthmanEmpire 2021-07-16 17:06:26

Super advanced. Thanks for the video =)

0 likes
I_AM_UR_MANAGER 2021-03-30 16:49:41

So clean, so cool i love this video !

0 likes
Jay 2019-06-01 02:28:28

These are fantastic. Keep going

0 likes
Vince I 2021-10-15 19:48:44

does Ghidra have malware/trackers built into it? I'd guess running it in a locked down VM is recommended, right ?

0 likes
Foosa Braun 2019-03-16 08:57:44

Awesome stuff, thank you!! :)

1 like
traxonja 2019-03-22 22:47:08

This channel is going to blow up! Subscribed.

0 likes
3xpl0it 2020-02-10 08:43:11

Ghidra ninja can you suggest a course where I can start learning this stuff?
Thank you

0 likes
Wantyapps 2021-02-05 16:21:12

What did you use to record the keybindings at the bottom?

0 likes
Ashok Vj 2019-04-03 17:33:49

Bro awsm video i have became a huge fan of youu you have got the skills man

2 likes
tehdrek 2019-04-04 09:42:05

This is so awesome! Sure hope NSA pays you well :*

4 likes
Replies (1)
kartoffelwaffel 2019-04-21 08:20:00

Haha that's what I was thinking. He seems pretty experienced with software the NSA released only a month ago...

1 like
The Weird Dev 2019-10-08 16:37:43

I subscribed and enabled the notification. Thanks for the great video.

0 likes
eric angleton 2020-12-27 20:59:18

Phenomenal vid/tutorial!!

1 like
Rafsan Uddin Beg Rizan 2019-04-01 11:03:18

You should make more video man. Love your video <3

4 likes
Fuan Ka 2019-04-04 02:11:28

Very interesting, thanks for sharing!

1 like
BusDriver19 2019-03-14 16:02:26

You should make a video series on what each option means in Ghidra

4 likes
Replies (1)
Jarosław Kamiński 2019-03-18 20:32:10

Yea that would be cool.

1 like
Leeroy 2019-04-02 00:52:32

damn tools are horrifyingly powerful nowadays.

9 likes
Jean-Christophe Baptiste 2019-03-19 20:36:56

Awesome, thank you !

2 likes
Ekardon Senior 2020-05-07 18:18:12

your video encouraged me to hack into my router fw. I was able to crack the fw verification dunction :D now how do we compile it back so it can be flashed? i checked fw-mod-kit but i am not so sure.

0 likes
A Rob 2020-04-12 04:38:58 (edited 2020-04-12 04:39:27 )

Do one for Wireless Mic Systems like Shure and stuff like that

0 likes
Lahcen Edaif 2019-11-26 15:33:00

yeah man this is what am looking for . thx bro (y)

0 likes
Здравствуйте муравья 2019-03-23 08:10:08

Quality of the video is excellent!

3 likes
Andrew W 2019-03-26 19:08:24

Fantastic video! I keep checking YouTube to see if you’ve uploaded.

1 like
kakashi sharigan 2021-03-27 01:41:09

Strong content!

1 like
und3rgr0undfr34k 2019-06-06 04:46:39

woww! So much good info! Awesome!

0 likes
Hans Baier 2022-01-25 09:44:41

Awesome! Thanks!

0 likes
Bastel Wastel 2019-03-22 14:27:36

Well done.
Looks like ghidra is some decent tool.
Still wonder what NSAs endgame here is

1 like
Replies (1)
Crow Corvid 2019-03-23 15:38:08

The most obvious benefit is that the software gets plugins developed at no cost, bugs are fixed at no cost, and you get an army of devs scrutinizing the code to make it the best it can be. Simple benefits of open source. They also increase their talent pool. In case that wasn’t enough motivation the US gov has a quota they need to fill on code they open source to the public under an Obama legislation.

0 likes
Eze 2020-11-17 23:34:26

sir you are a scholar and a gentleman, imma check all your vids

0 likes
Elliot Mason 2019-03-26 17:13:49

Smashed that subscribe and notify button fast AF! Keep them coming!

1 like
murat Xxc 2019-11-03 17:58:28

Mükenmel çok teşekkür ederim 🙏

0 likes
Filip Carlsson 2021-03-06 15:03:16

what about a firmware that was encrypted from the beginning?

0 likes
Int 0x80 2019-03-24 17:35:38

This video is amazing. Subbed

1 like
Jonas Mayer 2020-03-19 14:01:53

Wow this is reeeeally cool!!

0 likes
Asaf Cohen 2020-02-26 19:01:46

great content

0 likes
kostas 2020-03-02 19:44:43

Does the Ghidra decompile assembly to a high level language?

0 likes
Nicola Dellino 2019-03-14 17:56:44

Nice video bro :-)

5 likes
Soulife 2021-05-14 20:12:13

It's funny how he clearly understands what he's looking at but still renames things to help himself understand what he's looking at more clearly...
Brain, you so silly...

0 likes
billigerfusel 2019-08-02 19:12:19

Best video I’ve seen all week.

1 like
Hisham Haneefa 2022-01-30 17:11:04

Your seeing now is a master at work🔥🔥🔥

0 likes
Silica 🏳️‍⚧️ 2019-04-14 13:58:17

Lol now you can aes-ecb-encrypt and make a custom firmware

31 likes
Lucca 2019-03-18 02:23:14

awesome! cant wait for next video

1 like
舒鹏飞 2019-03-21 02:47:59

super super cooooooool ! love it !

0 likes
Escalada Segura A Mi Manera 2021-06-17 19:24:45 (edited 2021-06-17 19:25:10 )

hi, i did buy a software with server confirmation. the owner has closed the servr an i have no more access. can you deactivate the pass and the server function?- if so please, contact me

0 likes
R G 2019-03-14 23:33:17

Great video

2 likes
Hans Baier 2022-01-25 09:47:29

Couldn't find the second part of this video. Is it uploaded yet?

0 likes
Andrea Mazzi 2019-03-26 12:07:00

Wait. Is this liveoverflow in incognito-mode?

13 likes
Replies (1)
stacksmashing 2019-03-26 12:09:53

Hah, it's not, but we are from the same country! LiveOverflow is the best.

22 likes
divadbate 2019-03-16 08:36:23

Great vid. Thanks

1 like
John Dripper 2020-05-14 17:57:36

can you reverse engineer nokia 1100 firmware (DCT4) encrytion to mod it to include my own images ringtones etc :)

0 likes
DonQuichotteLiberia 2021-05-16 21:01:33

The entropy of this video is enormous, I can see that without running binwalk -E.

0 likes
Replies (1)
dumle29 2021-05-19 13:12:41

You're saying it's very random? :P

0 likes
Jimmy Shawrette 2021-03-20 08:32:00

excellent!

0 likes
Mempler 2019-03-26 12:19:16

Gutes video ^^

1 like
Replies (1)
stacksmashing 2019-03-27 12:38:29

Danke!

0 likes
Magovit 2020-02-20 00:35:53

Wowwwwww Super!

1 like
Zavitar 2019-03-14 16:33:08

Genius! Got a New sub

1 like
Kermit DaFrog 2021-02-09 04:15:11

Does Ghidra work on Linux?

0 likes
Manny Calavera 2020-05-15 20:44:11

Wish I had taken up programming as a kid, learning t h is as a middle aged guy is painful

0 likes
Khôi Lê 2021-11-22 14:26:57

I know it has been 2 years and moxa W2150A v1.11 is no longer available. So hopefully, somebody pls send me that firmware so I can do some cool experiment.

0 likes
123 321 2019-10-27 18:34:28

Danke Bruder. Hilft mir sehr

0 likes
The Leopards 2019-03-15 11:07:02

awesome man work on iot devices

1 like
kalexander777 2019-03-21 01:09:08

I think it's creepy at this very time they're handing us this knowledge and power.. how much trouble are WE really in??!

1 like
450o054 2021-03-23 15:32:09

everything flew over my head

0 likes
meideru 2021-05-13 23:12:49

I respect you

0 likes
Saeed Mahmoodi 2019-06-29 10:25:58

where is my wanna cry decrypt part 2??
we realy want it man
i enjoy ur videos even more than P0** videos
please make videos faster and 1 video about reverse engineering basics
<❤/>

0 likes
Fenix 2021-03-25 00:17:05

wtf i just saw. You changed my life from today.

0 likes
Gravy Padruski 2019-04-03 08:22:35

Boom! Subscribe button got hit ! The bell got hit !

1 like
H M 2019-03-19 12:41:38

Can this method apply gaming consoles example PS4 extra..

2 likes
Replies (1)
stacksmashing 2019-03-20 17:00:44

The basic reverse engineering procedure yes, but the firmware protections of modern gaming consoles are far more advanced - check the videos of fail0verflow to learn about console security (with a focus of homebrew, not piracy)

2 likes
John Woods 2019-03-20 13:14:41

ps. how did you know it was ECB AES over CBC or otherwise?

1 like
Replies (2)
Idan Horowitz 2019-03-20 15:02:13

the decryption function where he found the buffer offset was already called ecb128 after ghidra extracted its symbols

2 likes
John Woods 2019-03-20 15:04:14

Idan Horowitz thanks!

1 like
Cau xxx 2019-10-11 20:26:23

please keep reversing engineer public

0 likes
Replies (1)
Cau xxx 2019-10-11 20:32:12

This have an amazing quality!

0 likes
QuantPhilosopher89 2021-05-06 12:41:02 (edited 2021-05-06 12:51:08 )

Don't know anything about decompilers and I'm wondering how does ghidra infer function names?

0 likes
Replies (2)
stacksmashing 2021-05-06 14:23:51

The function names on this cases were included in the binary :) otherwise you just get fun_0x... names

1 like
QuantPhilosopher89 2021-05-06 20:38:43

@stacksmashing Thanks for the answer. But why would closed source software keep the function names in their binary? I would assume that (substantially?) simplifies reversing.

0 likes
Jeremy G 2019-03-21 11:46:09

Subbed thanks to Reddit

1 like
realcygnus 2019-03-22 04:50:18

cool.....heavy duty

1 like
Rando Youtube Viewer 2020-05-03 16:08:06

DOPE AF

2 likes
Replies (1)
Rando Youtube Viewer 2020-05-03 18:53:27

hey was looking for part 2 but found your 34C3 talk on SCADA system that will do i guess :), Again thank for sharing outside of con that's nice :)

0 likes
James Smith 2019-10-24 20:17:29

wow

0 likes
Chadius Maximus 2019-05-05 23:43:21

wizardary

0 likes
Marbiangki Lapasam 2019-05-25 10:36:06

From where did u learn all these shits dude??

0 likes
Austin 2020-02-27 06:22:00

Holy shit.

0 likes
Adriano Cantova 2022-03-21 13:56:03

Like si tu es aussi à l’HEIA

2 likes