hobune Channels Contact About Donate

Reversing WannaCry Part 1 - Finding the killswitch and unpacking the malware in #Ghidra

Back to video page | Download comments jsonl

Comments (archived 2022-07-02 02:32; 494 top, 737 total comments)

barack Obama 2019-05-19 02:24:06

mom : downloads and runs wannacry

mom : stupid videogames slowing down my computer

3314 likes
Replies (18)
Raj Sarkar 2020-02-10 03:55:07

Lol

13 likes
Techno Vortex 2020-02-10 18:48:41

Its that damned phone

101 likes
Creepinson Productions 2020-02-14 01:58:18

@Bien Crafts • 32 years and XD

5 likes
カツィCatzee 2020-02-21 23:57:08

@Techno Vortex God damn color brick doohickeys!!!

8 likes
timur sokol 2020-11-29 20:44:52

I can relate

1 like
Un TRÈS Ennuiant Retro Gamer 2020-11-30 19:21:00

🤣

0 likes
TamilxCTF 2020-12-13 03:09:41

Oh ur mom hve tech skilzz

0 likes
IWolveX Gota 2020-12-22 12:26:05

My mom cant even look up how to download somting

5 likes
Erwin Schrödinger 2021-01-06 05:47:39

🤣🤣🤣

0 likes
Erwin Schrödinger 2021-01-06 05:48:30

@IWolveX Gota my mom don't even know how to turn of a computer

1 like
b888 2021-01-06 20:55:02

@Bien Crafts • 32 years and rofl

0 likes
Arik Nel 2021-03-14 02:03:33

@Ali Chandler nobody asked, bot :)

1 like
Linux Dog 2021-05-18 19:00:46

Mom: I did nothing it happened by itself

0 likes
Twisted Code 2021-06-11 00:44:36 (edited 2021-06-11 00:46:02 )

Considering I just had to help my mom with someone defrauding her via her Amazon account (which had an embarrassingly simple password on it), and she was often the one to play the "the bad guy" and get me off my video games for dinner when I was growing up, yeah I can relate. Not that I'm complaining about either part of that (I love the opportunity to be my mom's hero and I did have a bit of a gaming addiction in high school... i seem to have developed a work ethic since then?), but I wish I could say I got the tech smarts from both sides...

1 like
ChocoMilk 2021-06-18 17:01:04

i bet its the 5g's

0 likes
ChocoMilk 2021-06-18 17:01:35

@Erwin Schrödinger my mom rages and cries over drag and drop

0 likes
Exiiko 🔥 2021-06-23 18:14:40

They complain about the built-in solitaire

0 likes
Silica 🏳️‍⚧️ 2021-10-14 11:59:17

How can videogames slow down the computer even when there not running?

1 like
安笑生 2019-04-11 09:08:01

Reverse engineering enhances the understanding of both programming thought and skills. This video is easy to follow, and the main techniques of reverse engineering are shown clearly, which makes me want to decompile a small interesting program to analyze it.

406 likes
Replies (2)
Palace Wandering 2020-02-08 10:31:49

安笑生 yeah we can learn programming from reverse engineering stuffs
你好同志

7 likes
r0x 2021-01-08 15:32:07

lol

1 like
Sourav Goswami 2019-04-06 06:07:48

Looks like Ghidra is a very good renaming tool!

1329 likes
Replies (10)
aasquared 2020-02-08 18:02:07

@Vladys Maximov keep us posted mate

43 likes
Luzum 2020-02-09 19:58:55

@Vladys Maximov weird flex but ok

84 likes
Madghostek 2020-02-09 23:12:38

@Vladys Maximov I tried out ghidra and improved my performance like 10 times (mainly due to being shit in reading asm fast).

14 likes
Erkin Dalkilic 2021-01-03 11:29:26

Phahahaha:))))

0 likes
b888 2021-01-06 20:56:27

@Jon Armani rofl weird flexes

1 like
Desmond Hawkins 2021-05-17 00:59:41

@Vladys Maximov what kind of pleb reads disassembled code… is hex too hard for you? Just eyeball it, find a `t` to change into a `u` and that's it, your JE becomes a JNE and the program you're cracking will now accept any license key. This is so easy that me and my hacker buds can do this in our sleep, blindfolded, going uphill in the snow (both ways). Noobs gonna noob, what can you do.

9 likes
علاء الحاج 2021-05-28 20:28:06

I don't really get it ... How to get started?

0 likes
Desmond Hawkins 2021-05-29 01:09:14

@علاء الحاج Get "The Ghidra Book", it's a good way to get started.

0 likes
ChocoMilk 2021-06-18 16:49:36

i just rename to .txt and use notepad lmao
im lazy

0 likes
Low Nexury 2022-02-05 20:58:41

Instructions unclear, renamed my whole family. We are Russian now

1 like
Juozas Miškinis 2019-03-27 20:26:26

I always found reverse engineering videos hard to follow but yours are very coherent. Thanks! And please consider Patreon at some point.

909 likes
Replies (5)
Skillfully Executed 2019-04-03 13:35:35

Well i kinda fell out when he opened ghidra as i am not very familiar with reverse engineering windows applications.

15 likes
Ryan Johnson 2019-04-04 01:21:15

There are open source alternatives to patreon that don’t shaft their users

15 likes
Hà Minh Thế 2020-02-10 11:45:43

@Skillfully Executed 1pa

0 likes
mlg 2020-05-04 00:04:26 (edited 2020-05-04 00:04:50 )

uh... He explains too fast and the video is spedup a lot, not very easy to follow

3 likes
Doug Woodrow 2022-06-13 11:58:54

@mlg errm, try adjusting the speed?

0 likes
Algorhythm 2019-04-03 19:19:12

Love this! Please create a series of Reverse Engineering Basics!

369 likes
Replies (4)
Adrian Dostoevsky 2019-04-26 19:12:57

Seconding this.

11 likes
Olivia Smith 2019-04-28 07:26:50

Yes

2 likes
Matt Zelda 2019-05-06 19:15:17

Just gotta learn GDB, Radare, OllyDBG for Windows, and assembly. And even then the assembly is the part that while takes the longest isn't too bad once you get used to it.

9 likes
Matt Zelda 2019-05-06 19:15:55

Oh and IDA / Binary Ninja are good too.

3 likes
freeweed4all 2019-04-01 14:10:27

Using an open source reversing platform like Ghidra, everyone could potentially come closer to the reversing world. Oh what if I could be some years younger..

155 likes
Replies (6)
Decent 2019-04-05 15:16:15

what do you mean years younger

0 likes
freeweed4all 2019-04-05 15:34:31

@Decent I'm too old to start studying in depth reversing, now.

4 likes
Victor Nascimento 2019-05-04 19:23:16

No one is too old to learn.

67 likes
MedVFX 2019-05-24 19:47:02

@freeweed4all how old are you?

1 like
freeweed4all 2019-05-29 12:27:04 (edited 2019-05-29 12:29:48 )

@ShowNadda thanks for the support. I made a choice some years ago, leaving netsec to start studying at University a totally different thing: knowing today how this sector is growing, maybe my choice wasn't the right one. Today, with these excellent resources, is far more easy to fill the gap with skilled reversing ppl: some years ago they appear like a part of a niche, like an out of reach status. This effect is an outcome of how much the reversing job offers are growing (US government choice about Ghidra isn't random).

13 likes
skeeber k.h. 2022-01-24 07:20:08

Why how old are you rn ?

0 likes
Lynx 2019-04-03 11:19:08

I'm a vegetable that doesn't understand anything but this was an interesting video

2320 likes
Replies (16)
Ozzy Man Diaz 2019-04-14 06:32:04

@foda-se
takes one to know one! unless you're a reptilian

17 likes
Piscigone 2019-05-13 13:05:16 (edited 2019-05-13 13:05:53 )

read the book Code by Charles Petzold. You will understand how the CPU and assembler works even if you are a total noob. After that you will automatically understand how programming languages work, reverse engineering too and so on.

15 likes
Rajath R Pai 2019-05-28 16:23:54

@Piscigone is this true? I really want to give it a shot

4 likes
Piscigone 2019-05-28 16:45:18

@Rajath R Pai trust me. Petzold is a guru

1 like
Ford Mustang GT 2019-05-29 10:10:52

@Piscigone code by charles petzold?

1 like
Himanshu Pal 2019-11-24 09:47:55

Ok BOOMER

1 like
M. Rightway 2020-02-10 17:55:26

@Himanshu Pal an indian calling someone else " Boomer" ... these are the signs of Final days... i'm done :)))

11 likes
blackneos940 2020-02-12 17:14:06

@Ozzy Man Diaz Maybe he's an Avian.

2 likes
Chron 2020-02-21 22:36:31

Vacaboy thanks for the recommendation! I ordered it

0 likes
Candy Cheats 2020-12-24 03:55:03

@Chron or you know, just take a peek at Caleb Curry's youtube channel and watch 10 hours of c++. Godly put together video.

1 like
frogg 2021-01-31 01:28:11

@M. Rightway? Why can't indians call people boomers. I get their comment was cringe but what's with the weird racist shit

5 likes
Ksawery Tęcza 2021-03-11 14:52:25

me to xd

1 like
Fluffytoast 2021-06-16 21:13:53

what

0 likes
Dhuill 2021-07-01 12:04:26

@Rajath R Pai you wont “automatically know” but I bet you’ll have great understanding on how coding works. Making learning coding a lot easier

3 likes
Rajath R Pai 2021-07-01 12:29:30

@Dhuill yea, it's a good book.
I would recommend

0 likes
J4y_boi 2022-06-28 07:44:04

xD saaamee

0 likes
nit. 2020-01-17 00:07:16

Wow that was probably one of the best descriptive reverse engineering videos I've seen to date. Your method of explaining and showcasing each step in each function is fantastic and even explaining how to identify when disassemblers/decompilers mess up and how to fix them.


Bravo. I'm upset that I waited this long to actually start watching these videos.

5 likes
Dale Sparrow 2019-04-04 15:04:37

This was SUPER interesting and well made, please continue! You left us on a cliffhanger!

8 likes
xWipeout 2019-04-02 11:09:32

Interesting and good video. Reverse engineering and programming isn't really my thing and a lot of it is going over my head. But it's an interesting and informative video none the less. Waiting to see part 2!

7 likes
TheDucklets 2019-04-03 12:45:00

Really well done video. I think you should keep this series in this format. Personally I like the pacing of the video, and wouldn't want it slower, or faster.

10 likes
WindBringsMemories 2019-04-02 19:23:12

Nice tutorials man! Maybe some basics for reverse engineering video's in Ghidra would be great as well! Like explaining how the system works and what each action truly means :). But it's great :) Can't wait for the next one.

3 likes
KamuiPan 2021-02-17 20:55:30

Great Content. I wish I could find and neutralize all the malwares myself instead of depend on a software, but I guess people like you decode all those anti-malware software. Thanks for the work if you are reading this and work for such company!

0 likes
Sébastien DUCASSE 2019-04-03 10:54:41

Very interesting and complete video, first time I watch a reversing engineering video and I love the way you investigate and explain what you do. It's the first video of your channel I see and I love it. Keep going !

3 likes
Saad Eddhaher 2020-02-11 14:48:45

everyone: try not downloading files from entrusted places!!!
Ghidra: let's unpack the malware !

179 likes
Replies (5)
Naxzed 2020-02-22 12:23:24

@starshipeleven He could use a VM.

0 likes
Bruno Eilhart 2020-02-27 13:40:59

What is an entrusted place?

1 like
FatFr0g 2020-05-05 02:42:52

starshipeleven presumably you download the sample from within the VM, then disable the Ethernet adapter that gives the VM Internet access to prevent worms from going through the connection.

1 like
FatFr0g 2020-05-05 04:00:07

starshipeleven forgot about that option, thanks for reminding me.

0 likes
yaelm631 2020-05-12 00:50:07

Just something that scares me :
They are easy accessible websites to download loads of virus to try antivirus and understanding how they work ?
I hope they tell the user several warnings before sending the file

0 likes
CsecGuy 2019-03-31 14:14:34

Very nice video, thank you. I would definitely want to see more malware analysis with ghidra videos. :)

6 likes
George Dömse 2019-04-05 06:32:45

Just wow. Impressive job! I hope you are employed by one of the major tech/AV companies.

12 likes
Kristóf Várszegi 2019-04-03 09:14:49

Keep up the amazing work you do with your videos!

2 likes
Chasing Midnight 2019-04-09 22:08:43

Wow... as difficult as all this sounds, I'm a new security enthusiast, so I'm still learning. I was able to understand and somewhat follow what you were doing. kudus.

2 likes
Jell0zz 2019-04-29 07:55:17

This looks very interesting, great analysis, even for laymen.

1 like
jed833 2019-03-28 00:37:14

Fantastic Video, I hope to see more both on wannacry and other things soon. As an embedded SW guy looking to get into RE this was great.

4 likes
Sander Speetjens 2019-04-02 14:30:00

Looks good want to see the following episode. Reverse engineering seems pretty fun.

9 likes
Muzammil Butt 2019-04-04 19:41:01

Would love to see a tutorial on TP-Link router firmware RE or firmware with similar architecture, reverse engineering and rebuild of the firmware. Love your videos so far.

2 likes
vengefulgod 2020-02-13 00:41:08

Great work and love what you did to show us how to reengineer a malware program like wanna cry I am in discord and on htb trying everything I can do to learn this so thank you and this is very helpful

1 like
Miles Dowe 2019-07-16 23:13:24

I came across your channel shortly after downloading Ghidra. I appreciate how you clearly detail your train of thought in each video. I hope to see more!

0 likes
Oleksii T 2019-04-04 10:02:37

Best video i ever seen on reverse engineering, keep it easy to understand! Thank you.

1 like
Mesaj 2019-03-27 22:06:26

I don't really know what's going on because Im noob but these videos are cool, this is the best and practical approach I've seen I think, loving it and subbed immadietely, good commentary, step by step. Waiting for more.

2 likes
Drakibble 2019-05-08 04:56:35

Hey, I love watching reverse engineering videos! Thank you for this one. I'm glad that the YouTube recommendation bots have blessed you.

1 like
Alessio Colombo 2019-05-07 21:08:14

Thanks for the great work! Can't wait for a part 2

1 like
Damien W 2019-05-10 13:02:45

Wow, I learnt so much about decompilation in this video! Thanks, keep it up!

0 likes
traida111 2021-05-15 00:48:56

The thing that blew my mind the most, was the list of language translations you found in the passworded zip. Made me realize how much they really scaled this thing to take on the world. Absolute savage. Who ever did this was well organized. Do you ever wonder if they watched this video?

0 likes
Blu Bear 2019-04-01 04:17:47

Great vid! Kepp it up! Would you be able to make vids on "how to" for learning malware and reverse engineering? Im a noob to coding and learning this stuff is really interesting! Thanks!

0 likes
Weaver 2019-04-03 18:30:40 (edited 2019-04-03 18:32:01 )

I honestly didn't understand a single thing but I still appreciate the video, so thanks for sharing this.

I wonder who was behind the attack. It pisses me off there was nothing I could do to help when it happened to my relatives.

5 likes
Replies (1)
FatFr0g 2020-05-05 02:47:35

It might be finger pointing, but the US, UK, and Australia claimed that North Korea was behind the attack.

0 likes
robinbuster 2019-04-23 20:53:07

Wow, ghidra has very powerful refactoring. I wish it had a debugger

1 like
FNC Danium 2019-04-10 00:51:35 (edited 2021-01-18 07:19:53 )

You know too many things. You explain it too casually like it's food lmao.

This guy be like:
Ok, let me present you my house.

1715 likes
Replies (11)
Lion 2019-06-17 14:22:38

hijacking this to say WE NEED PART 2

18 likes
User 12 2020-02-09 12:23:30

Inserts his too powerful(smart) to be kept alive meme*

5 likes
A 2020-02-11 11:58:52

looks pretty standard to me

2 likes
Nano 2020-02-11 11:59:22

Plot twist: he is the hacker who made wanna cry

16 likes
brunph 2020-04-28 07:23:05

marv b first 20 minutes is really basic stuff. Its just general reversing and assigning names

2 likes
Jake Crowley 2020-05-04 04:56:46

@marv b Yeah, maybe you're not interested in it, but someone has to do that sitting, typing, and staring or you wouldn't have a computer or smartphone to type that comment on. To each their own, I guess.

5 likes
Eg That Youtubes 2020-12-25 17:11:14

Chefs: Yeah so it's easy!

0 likes
Beary the mp5k pro 2021-01-07 02:48:11

@A no one asked

0 likes
Vlad Golov 2021-01-18 04:07:16

He prob wrote it

0 likes
Epic 2021-07-15 15:35:15

@Vlad Golov SUS

0 likes
Epic 2021-07-15 15:35:46

I agree, but that's probably on my end.

Best comparison I can think of is watching a speedrun of a game that you've never heard of before.

0 likes
Saeed Mahmoodi 2019-12-25 08:29:40

first time i watched this about 2 year ago and i was a simple java programer
now i am a c/c++ programming working at a hardware developing company and i just watched this again
that was awesome , i finally understood what was u talking about , i am always checking u tube for part 2 please upload it i am tried :)

0 likes
kripposoft 2019-04-29 19:47:39

This was super interesting. Please continue with this series

0 likes
Lookey 2019-04-08 08:50:29

Very informative and interesting video. Thanks for that amazing upload! I cannot wait to see its continuation.

1 like
Daniel Alejandro 2019-04-16 18:41:07 (edited 2019-04-16 18:43:37 )

Pretty nice video I found it really interesting, I didn't know reverse engineering is this fun

0 likes
Osama Al-Wardi 2019-04-03 09:11:24

Wow this is very impressive! Great job & keep going :)

10 likes
Chris Rider 2019-05-05 23:23:40

Great video! Thank you! When will part 2 be released?

2 likes
Aibh 2019-05-30 18:51:58

I’m trying to learn Ghidra and reverse engineering in general, and this and your other videos are so helpful.

0 likes
Mahdi R 2019-04-05 04:25:58

Man, I used to debug exe using ollydebug and you are taking it to another level 🤯

2 likes
Reckless Roges 2019-04-04 09:27:49

I am looking forward to the next video. (Should you encrypt the copy of Wannacry on your website using the AES key in your previous video? That would protect script kiddies from themselves and create a nice easter egg/crackme challenge?)

2 likes
András Fogarasi 2019-04-19 22:14:55

Reading the WannaCry warning, the creaters were real lads, providing multiple languages, information about BitCoin and a contact method.

They just sound incredibly kind.

16 likes
Replies (2)
Gabe 2019-04-22 18:08:00

tbh, i think they knew that they would affect millions of devices. humble people

4 likes
Lauren M 2021-01-17 22:06:55

Kind, maybe not, but they were reasonable. Do as we ask and we promise all will be well. And see we have written in clear language what we want you to understand. Give us the money and have a nice day 😊

1 like
TheMadMagician87 2019-10-14 08:21:01

Thanks for your videos, great detail. I hope you carry on with this channel and it's content.

0 likes
Bernhard M 2019-04-04 13:55:29

That was very insightful! I'm a software developer/architect for 17 years now and I must say that you have a very nice way to tell details and to guide your audience. thank you very much!
for the follow up video I would like to see the "physical" impact of the malware, like show the registry-key or the installation folder to make it more understandable for non-developers.

15 likes
Tibix 2019-04-25 21:01:08

I'm not an expert myself. But I really enjoyed the video. Please do more.

1 like
SnowCold 2019-04-19 00:18:35

This is very interessting! Can't wait for part 2. Have discovered these malwares before, but fortunately it was on a computer with no important stuff on it. One question, are you really using mac osx or is this linux with mac os x skin ??

3 likes
Replies (2)
Βеʀƙ Ӧzcẫñ 2019-04-20 23:12:09

Nope this is macOS

0 likes
Muffin1634 2019-04-23 05:50:16

it's macOS 2: electric boogaloo (system-wide dark theme included)

get your copy today and save 50% off the normal cost!

0 likes
PASTRAMIKick 2019-04-10 20:45:07

I used the GNU debugger to reverse engineer some stuff, but with more complex programs it gets harder, this seems make things more agile and clear

5 likes
Replies (1)
Codrut Ilie Ban 2019-04-15 07:58:36

Might be just Ghidra making it seem too easy 😃

1 like
blahburz 2019-04-04 18:09:50

I thought it was a long time before the kill switch was actually discovered, but it seems here that you uncovered the url 5 mins into the video. Is it really that easy or is it much harder than it looks?

4 likes
retro 2019-09-05 22:31:59

Your videos are excellent. I very much hope that you make more.

0 likes
Dimitri G 2019-04-17 21:10:02

Highly informative! Clearly explained, only understood about half of it but subscribed!!!

0 likes
Noor Muhammad Malik 2019-09-02 17:22:40

Can you please provide part 2 as well? I was following along the tutorial very well, and can't seem to find second part of this. Thank you!

0 likes
Hydrochloric Acid 2021-02-03 18:11:18

I have no experience in malware reverse engineering, and my own programming experience is limited, so perhaps someone could answer this question for me:
After watching the interview about the killswitch, seeing the code and seeing how fairly visible the URL is, why was WNCRY such an issue? It seems anyone with a tiny bit of experience in reverse engineering could have found the killswitch with a bit of luck and/or quick thinking.

1 like
Replies (1)
luke france 2021-06-27 09:41:12

Maybe it’s like a puzzle. Where when you know the answer a puzzle that could have taken a long time to solve now takes less then a second too solve. The solution makes it look easy.

1 like
Janne Kotka 2019-04-03 10:27:35

Thank you for the video, very entertaining. As far as i understand, Ghidra is not currently available as full open source, but can be downloaded none the less? Has anyone tried looking inside Ghidra on seeing what else it is doing ? :)

5 likes
Replies (1)
RRA 2019-04-04 09:48:57

It's good if you are not on a Russian governamental network.

2 likes
dumbasPL 2019-03-28 13:34:47

Awesome work as always. Keep it up

1 like
Dawn V 2019-05-16 04:33:27

Ghidra looks like an EXCELLENT tool to manage an RE session. Top notch.

0 likes
yandros3000 2019-04-07 10:08:43 (edited 2019-04-07 10:08:57 )

Great video, I like the fast-paced-but-detailed format, good job!

Aside: did Wannacry really have an autodisable kill-switch with a plain-text url that a simple `strings` is capable of showing? o_O

0 likes
Replies (1)
stacksmashing 2019-04-07 11:46:02

Thank you! Yes, it's crazy :)

0 likes
lilrich1243 2020-02-06 21:24:53

Thanks to solo learn the C++ and the python course I understand the basic functions. I just need to finish the modules for both and I'll be able to understand this a lot better

1 like
Mohammed Almodawah 2019-04-13 20:57:23

I'm so happy that YouTube recommended this video to me. Keep up the good work! Waiting for part 2..

2 likes
Replies (1)
stacksmashing 2019-04-13 21:04:30

Hopefully tomorrow :) life has been busy

1 like
Bas Groothedde 2019-03-27 19:18:45

Amazing video, very good to follow and it helped me a lot with some frustrating 'features' in Ghidra. I found I was using the disassembler window more than the decompilation window because of weird decompilation results - you helped me understand getting better decompilation results by adjusting Ghidra's interpretation of some code.


Thanks!

11 likes
Replies (3)
stacksmashing 2019-03-27 19:19:46

That's awesome to hear, thank you! Feel free to let me know what else you have trouble with, maybe it's something I can feature in the future

3 likes
Bas Groothedde 2019-03-27 19:32:36

@stacksmashing I'll be sure to comment it when I find more stuff, but seeing you work already solves a lot of problems!

0 likes
Manuel Lopes 2019-04-01 00:48:34

@stacksmashing greaat tut, can please explain if possible im chrome devtools save the changes i make in offline? i want change a pwa web worker app that works online and offline but the changes i made nolt save when i restart the app, exist any trick to save?if i not save i only get the cache of pwa app and not possible open and edit i think, thanks

0 likes
night2night3 2019-04-04 04:21:49

The video is excellent, I understood most of it with some rudimentary background in programming. I would suggest that after you finish uploading all the videos running through the code, that you upload a 5-10 minute video with just a recap of what you learned and maybe a description of the overall workflow and your thoughts. I think that one would be a lot better for the rest of the 95% of watchers.

5 likes
Nahiyan Alamgir 2020-05-22 05:48:25

Amazing video, really informational. However, I'd love it if you didn't lower the volume of your voice at the end of each sentence; some words become incomprehensible.

0 likes
Death Grips 2019-08-08 00:41:03

I hope to be as knowledgeable as you on this topic someday - please make a part 2!

0 likes
Sanyuj Gupta 2019-04-11 18:41:08

Thanks man! Great content!! Definitely looking forward to more!!
All the best!!

1 like
Codrut Ilie Ban 2019-04-15 08:00:34 (edited 2019-04-15 08:01:24 )

Great video, one of a kind r-engineering video!
One thing I wasn't able to notice:
Was it a speedrun or a video montage ? 😃


Maybe because it was late night 😪

0 likes
Replies (1)
stacksmashing 2019-04-15 08:09:06

Thanks! I analyzed the file before the video, and then analyzed it again and recorded it, then created a voice-over and increased the speed of some passages to fit - otherwise this video would be even longer :)

0 likes
TExodus_ET 2020-08-29 21:31:51 (edited 2020-08-29 21:35:01 )

A Very Awesome Walk-through . On Point!!! ... Thanks. :D

0 likes
TheGoodGuyWithoutGuns 2019-04-03 14:50:41

I am just happy that there are people out there who understand stuff like this! 😅

5 likes
Khatharr Malkavian 2021-05-31 18:01:20

I wouldn't mind doing that for a living. It seems like the sweet spot between meditative focus, puzzle solving, and education.

1 like
Lefteris Eleftheriades 2019-06-09 22:10:45

Please make more tutorials, preferably on crackmes where we can follow along.
You have a deep understanding of refactoring, windows API, C and assembly.
One can learn a lot from your thought process. I have found the pace very good.
There is too much content out there from people who don't have the profoundness of understanding that you do.
The internet needs more of you is all I am saying...

0 likes
Kaller 2019-04-24 11:46:02

great work....can´t wait for part II

0 likes
Mend444 2019-04-09 17:59:45

Impressed by your work. Keep it up! :D

3 likes
Roman 2019-04-04 08:51:03

Hi, it's a very cool video. I wonder if you can try to de-restrict an ebike. They are all identical, but they are sold at an exaggerated price ($120). You can see it by yourself if you type speedbox, polini, etc. Thank you !

0 likes
Yz 2020-02-14 12:28:24

Your skills are unbelievable. Good job 👏🏼

2 likes
Miodex69 2019-04-03 20:35:42

Keep doing this. Show the world sth more about WannaCry.

2 likes
Awab Omer 2019-03-31 22:45:12

So fast and accurate like a real ninja 😂, nice video , I didn't have to use speed 2 , like I usually do 😂

3 likes
Здравствуйте муравья 2019-03-28 20:14:26

Again your videos are insanely good !!! Love it !

1 like
Dennis 2019-04-02 09:44:59

hey, thanks dude! Probably speeding up the video was a good idea. I wish I could speed up Ghidra itself in a live session. I tried to open Microsoft's comctl32.dll in it and it took forever, and made it very sluggish afterwards.


Quick question -- how do you load symbols from the Microsoft server into it? (Like we used to do with windbg.)

3 likes
Bryce 2019-04-03 02:58:18

Hi Ninja, everyone always asks how to get started into reverse engineering/ pentesting. I have a different question, since I learn better in a class environment with a professor and other peers which type of computer science would best fit the type of work for pentesting? While a computer science degree would be nice in the end I’d have a lot of unusable knowledge. Where do I get started what would you recommend? What code languages are important? C++ java python? Where did you go to learn how to use GitHub properly? I’m really at a loss. Thank you for the nice video

0 likes
Yumikitsu 2019-04-10 13:37:06

I didn't understand anything, but I would have loved to cause it seems like a very useful skill to have and props to you for being so good at it!

1 like
Madghostek 2020-12-22 22:09:18

I learned a lot from this video, im surprised the strings weren't obfuscated in any way. And im surprised how bad ghidra's decompiler is lol

0 likes
Nicholas Larcher 2019-03-29 15:05:21

This is super interesting, however there were some parts that I did not know what you were talking about - mainly the parts where you talk about the code itself, around 3 minutes. I have a focus on network and security, but my coding is very limited (python only, intermediate level). What do you recommend to learn/get familiar with for reverse engineering or to look at code and understand it?

2 likes
Replies (2)
stacksmashing 2019-03-30 11:31:01

Yea, so my recommendation is to get really familiar with C - especially pointer arithmetic etc. From there you have a good understanding on how memory etc works and can go into assembler itself much easier :)

2 likes
QuickishFM 2019-04-01 12:55:29

A lot of Assembler can be attributed to C, especially the memory parts. Learn about C and then you will, at once, understand the memset functions and more

0 likes
Eggplant Unleashed 2019-05-12 02:13:25 (edited 2019-05-12 02:13:51 )

@Ghidra Ninja. I'm currently studying X86_64 ASM, and I have started basic RE of GNU/Linux Apps.
I have both the Source Codes for WannaCry V1 & V2. I can't quite remember where I got them from, but I don't know if they're still out there. I keep them on an External HDD; For future Ref.
Awesome video man. Liked & Subbed.

1 like
Fatih Gul 2019-03-29 01:37:38

Thank you. Really enjoy and learn much from your videos.

Does Ghidra is best in reverse engineering or do you advise another tool/program?

2 likes
Replies (1)
stacksmashing 2019-03-29 11:01:15

It's a great one for sure, but does not yet have a debugger (though supposedly it'll be released soon).

There are lots of tools:
- Radare2 (and Cutter as its UI) - opensource & free
- Retdec decompiler - opensource & free
- IDA Pro + Hex-Rays decompiler (Expensive, a free version is available of IDA though) - de-facto industry standard
etc :)

I am very impressed with Ghidra for non x86/x64 stuff, so I like it so far! But as you can see in this video, the decompiler really isn't the best for x86/Windows

4 likes
Jeremiah G 2022-01-27 23:49:32

This is good content. You just earned another sub and a share. Keep up the good work.

0 likes
Mitchell 2019-04-20 11:26:46 (edited 2019-04-20 11:27:08 )

Cool video! The domain is not exactly a killswitch, it was made to detect anti-virus sandboxes which arguably makes it a killswitch but I'd rather consider it standard control flow.

People have argued that the domain was intended to be used when the malware would become too widespread and the author would somehow regret making this massively spreading virus that he could kill it.

That's nonsense. It was to get around anti-virus heuristics.

0 likes
Nasser GHOSEIRI 2019-04-06 13:59:04

This is some quality work! Congrats...

1 like
Emre'nin İşleri 2019-04-22 16:15:36

Waiting for the part 2. Also please make videos about basics of reverse engineering.

0 likes
Tomas Viane 2019-04-20 13:34:54

I didn't understand anything of what you did, but the casualness of explaining something so exoticly complicated drew me in.

4 likes
RubenCO 2019-04-09 16:43:29

I am currently doing my bachelor in Computer Science and didn't know this reverse engineering even existed!
Very cool and very nicely explained. Showing the keyboard output is also a nice addition of you! Thanks :)

4 likes
Replies (1)
Elijah Burnham 2020-02-12 00:29:19

RubenCO what language is this in?

0 likes
Ado422 2020-11-02 14:21:47

How much time does it take to get on such level. As a total noob in programming its like watching magic

1 like
Andrew W 2019-03-30 00:09:04

Another great video. This one was a lot more difficult than the previous two or maybe I'm just stupid :(.

2 likes
Replies (2)
stacksmashing 2019-03-30 11:32:36

This one is definitely a bit more advanced, maybe I should label the videos accordingly? Not sure yet - but let me know if you have any concrete questions, trying to keep these as accessible as possible

1 like
Andrew W 2019-03-30 16:49:22

@stacksmashing Thank you for the reply. Overall the videos are great and the flow diagrams definately helped me understand what was going on. I think my lack of understanding of C probably doesn't help and that it is something I am looking to improve on. Any resources you would recommend that maybe approach C from a RE perpsective? On that topic, linking further supplementary learning resources is the description might help people like myself.

In your previous two videos the number of changes/adjustments you make within Ghidra are much fewer and you therefore have much more time to explain each change and add additonal knowledge and supporting information around each. This is where I learnt a lot in your previous two videos.

The production quality and effort you put into each video is very much appreacited. I'm going to give this video atleast two more watches all the way through and take plenty of notes.

0 likes
tehdrek 2019-04-04 08:23:06

Awesome! Making a scary subject seem doable.

1 like
popkahchin 2019-04-04 19:16:21 (edited 2019-04-04 19:33:11 )

I think you should make a throughout tutorials on hacking from 0 to advanced level. It would bring you even more views and many supporters will come too.It not only helps people know more about cyber security but also benefit you as well. Of course, you have to explain it in a simpler and easy ways so that beginners like us can understand and people will stick around. A lot of tutorials are either too complicated from the beginning or It just asks people to sign up some kind of paid programs etc.. This is not what we want.

1 like
Replies (3)
JackedCanadianGaming 2019-04-05 04:46:17

You can’t just watch video and expect to become a hacker. Strong programming skills make for great hackers, but you need to learn the basics first.

0 likes
popkahchin 2019-04-05 06:49:30

@JackedCanadianGaming I am not saying that I expect to become a pro hacker just by watching videos. I am talking about providing complete tutorials for people from any sort of level like one of those courses that you can take from udemy but this will be free. Just a suggestion for him nothing more. If he wants to do it then great, if not then it is not a big deal

0 likes
JackedCanadianGaming 2019-04-05 15:46:21

@popkahchin Oh yeah of course, but videos are hard to follow and you should get yourself at the very least a basic understanding of programming, and to be more efficient, learn about more advanced programming techniques to make it worth your time.

0 likes
Twisted Code 2021-06-11 00:39:01 (edited 2021-06-11 00:39:45 )

I was flying by the seat of my pants for most of this video, but I had JUST enough experience with C/C++ from college to follow MOST of what's going on?
Good thing there are better geeks than me that were on top of this thing before it could do... more damage than it did... and props to the guy that accidentally found the kill switch :-)

0 likes
Cameron Dyer 2021-01-03 00:14:48

you make me realise how little I know about anything. Great video

0 likes
vincent roy 2019-07-28 13:26:27

really good, short, intense, lot to learn! where is part 2?

0 likes
VoKuHiLaMan 2019-03-28 12:44:56

awesome video! I'd love to see more!

1 like
Josh 2019-03-30 20:59:04

This is fantastic, thank you

1 like
Nathan 'Nate' Whitehat 2020-04-17 15:26:49

I didn't think there could be something worse than coding in win32… I guess reverse engineering win32 does qualify.
Dear god, did that api age poorly.

1 like
Replies (1)
stacksmashing 2020-04-17 15:34:47

Couldn't agree more

0 likes
NameIst Unbekannt 2019-04-03 12:26:07

Wow Ghidra really does all the work !

0 likes
Stef M.W. 2021-04-05 23:15:31

learned more about programming from this video than from one year of college 😂

0 likes
Gir 2021-03-05 07:10:41

accidentally ran this on my pc a few years ago, good thing i was in a call with my friend because we closed it out in task manager before it could do all of its damage lol

1 like
Black Hat 2019-04-01 13:03:56

Excellent. Really. You got my respect.

2 likes
The Chemical Workshop 2020-02-05 08:40:16

Debugging and decompiling is so fucking hard, it's like backwards coding...
Great job!

1 like
Bekircan DAL 2019-04-02 11:33:44 (edited 2019-04-02 11:52:01 )

Subbed instantly.Cant wait for another episodes.<3

37 likes
Interruption 2019-05-15 08:33:59

Ghidra: does windows reverse engineering in iOS
Windows: "Am I a joke to you?"

166 likes
Replies (4)
Rohit A S 2019-05-23 09:35:06

macOS*

55 likes
Interruption 2019-05-23 09:50:23

@Rohit A S woops

6 likes
Juppie902 2020-02-09 14:58:27

more like Reclass: Am I a Joke to you ?

1 like
smw freak 2020-02-12 11:53:43

@Interruption LOL

0 likes
Adam Hassan 2019-06-02 03:51:19

You should do this with cryptowall 3 as well!

1 like
Gaston The Dank 'Tiel 2019-04-11 10:35:38

I understood everything except for the renaming parts. Meaning i did not understand a thing. Cool vid tho, you've earned a sub!

141 likes
gdm413229 2019-04-28 02:54:03

Hopefully you could code a tool that pigs out on .wncry files, cracks them with deep neural network based AI, decrypts them and emits the decrypted files without paying the ransom.

0 likes
Jared Cornall 2019-07-24 12:20:47

I'm looking forward to the second part to this series..

1 like
Jitbahan Samanta 2020-04-15 16:22:10

Nice explanation! Thanks...:)

2 likes
Arctic SpaceFox 2019-03-28 20:43:39

Great vodeos man!!!😁 Keep it up ! I'd like to see more like this reversing firmware malware .. 😅

2 likes
ChromaCobble 2019-04-03 18:43:52 (edited 2019-04-03 18:51:44 )

Well, I dont really understand well but Im here to understand it better, thanks for the video!
Edit: i actually managed to understand a part of it

6 likes
Ihab Mb 2019-04-04 10:13:49

Great video. Waiting for the next part

1 like
Creepinson Productions 2019-04-02 16:47:50

Awesome video! I also want to see more :)

1 like
Sean Bennett 2020-04-23 18:10:47

Hi Ghidra Ninja,
Do you run Ghidra through a VM or directly from your main machine?

1 like
Replies (2)
stacksmashing 2020-04-24 19:54:25

Both - untrusted binaries only in VMs, if I reverse for example self compiled binaries then I run it natively.

0 likes
Sean Bennett 2020-04-25 16:38:12

@stacksmashing thank you.

0 likes
B Targ 2019-04-02 15:50:13

Someone should port the entirety of Ghidra to QT with a dark theme and new icons

0 likes
Big White 2019-05-13 13:06:12

Waiting for part 2!

0 likes
FRIENDLY JAPANESE BUSINESSMAN 2019-04-03 12:24:05

Amazing, subscribed..... can't wait for part 2

1 like
Ujurak 2020-04-05 21:23:45

10:09 I'm not seeing where the " /i" is added as an argument in the decompiled code. Can you explain?

0 likes
linkin543210 2021-01-10 19:06:09

The person who bought domain name that act as a kill switch is almost certainly involved in creating wannacry

0 likes
azimut 2019-12-14 19:22:27

"Microsoft security center (2.0) sevice" LMAO

188 likes
Drakestophet J 2020-11-17 02:21:06

The creators of WannaCry must have been geniuses like this guy

0 likes
Sepehr Mohaghegh 2019-04-12 19:32:33

When will you upload part 2? It's getting interesting!

1 like
Replies (1)
stacksmashing 2019-04-12 20:37:13

Hopefully on the weekend! Been traveling for work etc

0 likes
shmupful 2019-03-31 23:08:44

Wow Amazing skill I'm SO envy I wish I could do that

0 likes
TissuePaper 2019-04-10 22:35:37

I swear I thought this video had only been five minutes long when it ended.

5 likes
Ahmed Kira 2019-05-30 13:52:17

Ghidra ninja:The function is very simple
Me:

90 likes
jon hoyles 2021-05-19 09:15:48

That’s some proper clever stuff great video x

0 likes
CoRrUpTaGoD 2020-02-12 12:03:07

honestly very useful and makes fun of the virus straight out lol in your face wannacry


wannacry: starts crying

0 likes
VRWarehouse 2019-11-02 17:12:28

Wow, part 2 please

1 like
Strategy Cube 2019-03-28 08:43:50

When I see a new video, I just have to find out what you’ve done with Ghidra.

5 likes
DeVoid 2021-05-18 19:59:56

I have one question, do you know a good way to get into c, and asm, I really want to learn both of them, I understand the syntax of c, but I cant really find anything that covers everything beyond that

0 likes
Bogdan Serban 2019-05-17 20:01:12

How do you get to know all this stuff so well?

0 likes
Adwaith KS 2020-01-03 05:59:35

Please post more videos on ghidra.. You are awesome👏✊👍

0 likes
Yegna Sivasai 2019-04-11 07:52:47

I didn't understand single bit of information u said but I watched full video..and subscribed.. Thanks for making this video

1 like
Luís V. 2020-05-07 18:35:06

I need to learn everything about this video and the part 2. But i'm soo far away to understand what he's doing, just made some simple algorithms in CodeBlocks C. Any of you can recommend any books or some information source that i could read to understand better?

0 likes
jbossman008 2019-03-27 23:44:57

That was elite. Way to go!

1 like
Tyler Durden 2019-04-06 13:41:25

Great vid!! So what was happening with the memset? Why are they all in while loops? and how did you figure out that they are memset?

1 like
Replies (1)
Gray Olson 2019-04-09 20:46:55

They were inlined and optimized by the compiler into that form and the ghidra decompiler didn't recognize the inlined/optimized form as being equivalent to the original function

1 like
xo xo 2019-04-03 13:53:01

First time YouTube recommended me something amazing. 😀

25 likes
nexdownfallrs 2019-04-17 17:43:26

very great video! keep going

0 likes
encrypted mind 2019-04-08 04:48:53

Great Video man,keep it up:)

1 like
Oscar Paguada 2019-06-14 01:54:29

Can’t wait for part 2

0 likes
Elliot Mason 2019-03-27 16:32:04

Thank you for your videos!!

9 likes
billigerfusel 2019-03-30 19:12:26

I like this format, but you state things, a bit more explaining would help, at least me, an embedded C programmer.

2 likes
Replies (1)
stacksmashing 2019-03-30 19:39:07

Appreciate the feedback! Do you have some examples on spots where you need more explaining? This video is definitely a bit more advanced, but trying to keep these as accessible as possible (without stretching them out too much) :)

3 likes
Are u TheGoodBoY? 2021-04-21 13:46:48

Very good video! Bravo!

0 likes
psy0rz 2019-04-16 20:33:47

You should do a lecture at CCC :)

1 like
Harjit Singh 2019-04-02 18:34:30

I'm more interested in mathematics and cryptography. Programming/reverse engineering isn't my strong suite. All in all this was good to watch but threw me off at some points as my knowledge isba bit dull in this area

9 likes
Replies (2)
JackedCanadianGaming 2019-04-05 04:42:30

Harjit Singh If you don’t understand Programming, especially low level code such as the C code here, this will definitely be all foreign.

2 likes
Harjit Singh 2019-04-05 18:17:20

JackedCanadianGaming definitely. I need to up my programming game lol.

0 likes
喵帕斯-大萝卜鸡 2019-07-22 22:39:03

Hope you can made more videos like this

0 likes
Mahmoud Salah 2019-03-30 21:05:08

الشرح ممتاز
Excellent

3 likes
Glenn/グレ 2019-04-14 11:45:22

Newbie tutorial please.. looking forward for more

2 likes
Silica 🏳️‍⚧️ 2019-04-14 13:33:00

Wow you do that so fast xD hmm very informative video and i learnt a bit about reverse engineering

7 likes
DM 💥 JIGGYPASS On IG 2021-10-23 01:18:44

He's the best indeed 🖕 mine works perfectly fine thanks dude 🗝️

0 likes
LS 2020-04-29 02:00:25

Could you show how to set up a secure VM for this kind of thing?

0 likes
NeXuSec 2019-04-02 08:29:11

keep going bro....excellent videos

1 like
Rob N. 2020-02-08 12:02:43

Absolutely amazing. Haven't really been in this field for over 25 years, but you and the cool fancy tools available today got me interested in doing this as a hobby again ;). Any chance that you could do this using Cutter on OSX only?

2 likes
Replies (1)
stacksmashing 2020-02-08 22:18:09

Love Cutter, especially for Objective-C binaries. I might do a future video using Cutter, we'll see :) If you have something specific in mind let me know!

1 like
Trenton Paul 2019-04-03 03:28:34

I didn't even know that doing something like this was possible

2 likes
Ant Man 2021-01-12 18:01:34

Interesting to hear from the workflow. Don’t know anything about it, but can at least connect some dots.

0 likes
Andrew Polemeni 2019-10-01 00:20:46

Where did you get the binary? or the uncompiled binary?

0 likes
Wolfennar 2019-07-08 17:25:45

Only vaguely understanding most of what is going on but damn this is so cool :D

0 likes
Tho Le 2020-11-28 22:01:22

can you make videos to reverse engineer shellcode (e.g meterpreter, cobalt strike)?

0 likes
mister kluge 2019-03-30 02:59:35

Damn, I'm impressed, subscribing and following with interest

6 likes
S F 2021-07-07 07:39:10

and some people still prefer to use old reversing tools from the 80's instead of accepting modern day cool tools. there is nothing wrong with being modern. and making tasks simpler to be done than the old days.

0 likes
traffictraffic 2019-04-03 18:00:26

I wish i knew what was going on, I've always had an interest in "behind the scenes" kind of stuff

0 likes
Said Lepatron 2019-04-03 12:14:29

Amazing ! 😯 Could you point us to resources to learn about all this ???

1 like
Replies (3)
stacksmashing 2019-04-03 12:15:14

LiveOverflow is a great channel to learn more!

1 like
Said Lepatron 2019-04-03 12:29:29

@stacksmashing thank you !

0 likes
tehdrek 2019-04-04 08:38:11

@stacksmashing Thank you

0 likes
kamu38 2019-10-07 04:55:39

Hi GN, any chance of new videos? They're high quality.

0 likes
Shannon S 2020-02-20 03:20:14

I have no idea what's gong on here, but I'm straining to understand. Great video!

2 likes
Daniel 2019-04-10 14:41:39

When is the next part coming I wanna see more😁

5 likes
Alberto Bolaños 2019-04-07 02:31:00

part 2, please!!!

1 like
Replies (1)
stacksmashing 2019-04-07 11:45:36

Working on it :)

1 like
Miguel Cruz 2019-03-28 14:15:20

You are doing God's work 🙏

1 like
LikeDesu V993+6 2020-08-26 09:22:22 (edited 2020-08-26 09:22:35 )

Thanks for the video! you big helped

0 likes
sleebu 2021-07-20 19:55:20 (edited 2021-07-26 09:29:56 )

Imagine they didn't VMP their malware lol

2 likes
Timo Witte 2021-08-05 18:20:46

They probably added the first code check with the URL to not run it in their testing environment / hide from analyzers that run in an offline mode and dont return anything for that hostname!

0 likes
Prerunning 2019-04-09 22:27:27

Awesome video looking fwd to part 2

2 likes
FloatingBlaze 2019-03-30 21:08:31

Great video!

1 like
Hot and Silly Cinnamon Roll gets Glazed 2019-04-04 23:58:40

It's something I've been intrested in. Anyone know a good place for an absolute beginner to rev to learn?

0 likes
Hernán González 2020-12-23 15:32:00

I understood some of those words. Very interesting!

0 likes
Ernesto Mercado Macias AT4RE REPT SND FFF TSRH ZWT 2020-12-16 18:23:46

Excelente ^^

1 like
Jerome Cabarus 2019-05-22 22:09:43

you have finally cracked the 'WannaCry'' virus! I'm Impressed

2 likes
M0rtale 2021-01-03 23:15:07 (edited 2021-01-13 06:13:22 )

I know it has been a year now, but the reason Ghidra was unable to parse InternetOpenA, HINTERENT etc as correct structs because it tried to look up the import dll on your mac, Wininet.dll, and its corresponding PDB, but it was unable to find either of it because you are on mac. If you are on windows ghidra would be able to parse them perfectly. How was it able to identify the function name is out of my mind lol.

1 like
ErixPloit 2021-05-30 08:12:51

perfect video the only catch is FF is to fast I cannot keep up what's going on :(

0 likes
MartyBoi 2020-05-12 16:54:52

imagine doing this and accidentally running wannacry. i would actually scream

28 likes
Replies (12)
Watema 3 2021-01-09 19:36:19

*laughs in multiple VMs running in Arch Linux*



i use arch btw

13 likes
BigbyTheBigBadWolf 2021-02-10 19:25:52

@Watema 3 no one cares

8 likes
Watema 3 2021-02-11 00:59:52

@BigbyTheBigBadWolf aparently you do cause you replied!
also (incase you haven't noticed), it's an inside joke

6 likes
BigbyTheBigBadWolf 2021-02-11 07:17:36

@Watema 3 still no one cares

11 likes
BigbyTheBigBadWolf 2021-02-12 08:49:49

@ahmed eshra ur prob crying behind ur screen: i dont care either but i gotta be an edgy loser so i can prove this guy wrong

1 like
BigbyTheBigBadWolf 2021-02-13 16:57:31

@Dentist﷽﷽﷽﷽﷽﷽﷽﷽﷽﷽﷽﷽﷽﷽ learn to read

1 like
BigbyTheBigBadWolf 2021-02-14 10:16:22

@Dentist﷽﷽﷽﷽﷽﷽﷽﷽﷽﷽﷽﷽﷽﷽ ur so funny with that lol at the end

0 likes
BigbyTheBigBadWolf 2021-02-14 15:26:45

@Dentist﷽﷽﷽﷽﷽﷽﷽﷽﷽﷽﷽﷽﷽﷽ yeah

0 likes
Watema 3 2021-06-24 13:57:58

@Plaane No shit Sherlock that's the goddamn point. You got baited hard

5 likes
Nick 2021-07-11 14:59:11

@Watema 3 Most tech savvy people understand that joke, it's corny and bland

0 likes
Silica 🏳️‍⚧️ 2021-10-14 12:00:27

That's why you rename it to wannacry.VIR

0 likes
MartyBoi 2021-10-14 16:04:02

this reply section is chaos

0 likes
Gamer 123 2021-07-12 13:05:12

Parents: Install obvious virus that slows down the computer.
Parents: It must be that Steam thing.

0 likes
Shay Lempert 2019-05-11 08:48:15

when is part 2 released?

0 likes
Cervi65 2019-04-21 18:51:37

Awesome! I feel like an idiot when I see things like this xD

0 likes
MrVidification 2019-04-16 22:05:02

what happens if you force a switch off during the countdown and hook the drive up to another system

0 likes
ViAik Breeck 2019-04-03 01:58:05

I could either treat this video as background noise or actually try to understand what's going on, which would give me a seizure and then cause an explosion inside my head

0 likes
Abdul 2019-04-04 20:05:44

Wow subbed 14 min in this guy is smart. Props dude

1 like
Maximus 2021-01-02 13:39:33

Where can I learn how to reverse engineer?

1 like
chat👉 jiggypass. On insta 2021-10-19 23:54:13

⬆️ I must have to recommend him he's realistic 💯❤️❤️

0 likes
chat👉 jiggypass. On insta 2021-10-19 23:53:50

⬆️ I must have to recommend him he's realistic 💯❤️❤️

0 likes
Abdulmajed Al.Marek 2019-04-14 07:00:55

Smart explanation

1 like
Viktor Chernev 2020-02-19 21:51:20

Hah this makes me laugh because I was developing a simple POC ransomware somewhere around that time I made public and I managed to lock a significant amount of my files by accident

1 like
Ynk.Rbrts 2019-05-29 04:31:54

I enjoyed this video. Subscribed!

1 like
Kick Ass Videos 2019-09-23 07:22:00

nach seiner Aussprache zu urteilen würde ich nen 10er wetten das der gute mann aus dem deutsch sprachigen raum kommt.
geniale Facharbeit, ich mag es wenn menschen ihre arbeit verstehen.

0 likes
Da Vinky 2019-04-03 11:52:10

subbed, 22 minutes passed like a breeze

39 likes
Synaxis 2019-04-03 17:36:57

what happens if you remove windows default encryptor?

0 likes
Technyk 2019-04-09 12:49:27

What key logger program you use? (I mean the thing what shows you the keys your pressed)

1 like
Replies (2)
stacksmashing 2019-04-09 13:34:57

KeyCastr!

0 likes
Technyk 2019-05-01 11:44:31

@stacksmashing Thanks, I will use it in my next videos ;)

0 likes
__ 2019-06-05 05:32:24

part 2 please

0 likes
Unknown 2021-01-03 15:56:28

can you record video about how to start learning reverse engineering. what books to read or where to learn.

0 likes
SullySadface 2021-02-20 08:34:16

I don't know shit about coding, but you've explained this in a very human-readable way and i appreciate that.

0 likes
fl1ppy 2019-04-03 12:14:37

Are you going to do some more crackmes?
I managed to solve a couple but on some i am just purely stuck after finding what IF staments is the key to cracking it but cant get what i need to find the password.

1 like
Replies (2)
stacksmashing 2019-04-03 12:34:21

Do you have some examples on crackmes where you are having issues with? Maybe I can do a video on them in the future

0 likes
fl1ppy 2019-04-03 12:48:12

5c83501333c5d4776a837df7,5c9ce65c33c5d4419da5562d these are the crackmes i got stuck on,i managed to get ghidra to clear up the code,and when i find that IF statement or something else that points to the password i just dont know what next to do to actually get the password

0 likes
Tsuki 2019-04-03 13:53:34

Nice video!

2 likes
Danko Kapitan 2021-03-31 00:35:26 (edited 2021-03-31 00:37:58 )

"Now we can see this looks much better"

Python programmers: wHaT dO yOu mEan "BETTER" ?!

0 likes
bk1337 2021-12-12 11:35:38

Ghidra is a really free source tool, It can fight with ida

0 likes
rk lal 2019-06-07 09:01:21

I love your videos. It inspired me to chose computer security for my career. Give me a heart.

0 likes
Anurag Choudhury 2019-04-09 16:42:36

YouTube algo has done it again. Could understand probably 1% of what was talked about, but it seemed very interesting. Subscribed!

3 likes
SOLOdrive 2019-04-02 17:31:20

Hi could you make sometime a guide on how to get into reverse engineering

1 like
Replies (1)
stacksmashing 2019-04-03 07:49:47

I might do some in the future! In the meantime you sohuld check out LiveOverflow, he does great videos on this kind of stuff!

2 likes
AerGlass 2022-03-15 16:43:27

this is the only guy who can decrypt wannacry without paying it lol

1 like
OthmanEmpire 2021-07-18 16:19:23

Thanks for the video =)

0 likes
S F 2021-07-07 07:41:03

what do we get from this video: ghidra is cool

1 like
Sander Bouwhuis 2020-08-16 09:23:29

Nice, nice, nice!
Thanks for the video.

0 likes
Ron Swartz Anonymous 2019-05-10 18:11:21

Hope you continue to make video's.

0 likes
GamingButNotReally 2019-05-19 20:19:52

This is gonna be epic

0 likes
Fuck You Google 2019-04-02 21:45:11

i was attacked by this i still have the how to recover html files on my computer in random places

2 likes
Mete Kaan Aktay 2019-12-12 17:47:58

When will you make the 2nd part?

0 likes
NotGonna Happen 2019-09-30 03:51:04

@ Ghidra Ninja - It was irresponsible of you to share a serious problem maker that is still active in the world .. Especially without presenting to people a simple, reliable, solid problem resolution. I'm sure you understand not all your viewers are software developers, yes ?.

0 likes
rrowhe4d 2019-05-30 14:09:42

After watching this vid, I hacked the NSA with a toaster. Thanks Ghidra!

0 likes
Replies (1)
US News Spot 2019-05-31 06:12:15

😂😂🤣🤣

0 likes
That Canadian On 2 wheels 2020-03-11 23:04:15

I'm getting morer dumber the more I watch and I love it

1 like
Nicodapeek2 2019-09-06 02:32:38

"This is part 1"


months later

51 likes
Replies (1)
Bernardo Kaluza 2020-02-09 10:39:24

6 days ago part 2 was released

3 likes
Kevlar 2019-04-18 19:24:04

great stuff thanks

0 likes
Topaz knight 2020-02-21 04:19:49

>Download Wanacry
>wait 7 days
>reimage disk and OS from format

Data destruction done easy

0 likes
Karl Gohlke 2019-04-03 05:33:53

thx a lot - just great!

1 like
B4XCode 2020-12-23 21:56:21

The title should be When an elite programer meets a hacker :))

0 likes
Tomato 2021-02-27 21:41:21

What, you mean I shouldn't run known malware on my everyday machine?

0 likes
SoloZoneMTB 2021-01-29 17:28:14

that URL is actually the domain that Marcus Hutchins registered to stop WannaCry from spreading. Each time the ransomware worm spreads over a network, the virus pings that address. If the address is pinged and online, it will no longer spread.

0 likes
Waiz Khan 2019-04-10 12:55:03

The ransomware is in file format.. . How do u make it executable??

0 likes
M.A.R 2019-04-03 23:14:09

This guy is cool 😎 subscribed

2 likes
Araiguma Alice Kiruno 2020-02-15 16:09:23

Great! Now i understand nothing :/
But very interesting

0 likes
bob smith 2019-11-01 00:00:25 (edited 2019-11-01 00:23:45 )

printf
Sadly for ghidra to demangle this sort of thing correctly would mean it has to be able to analise the string passed..., so in theory if the virus writer was REALLY good
he could cause the format string to be built from sub parts, thereby causing this part of the code to be difficult to decode for humans & analytics. thereby hiding arguments pushed onto the stack before the call........
I.E
push 5 items onto the stack before the call, build the format string , use 2 of the items leaves 3 on the stack hidden from analysis... use the 3 later as something else.

0 likes
scudsturm1 2020-02-13 08:38:04

will it run when u unpack it or only when u click 2 times on it?

0 likes
Sire 2020-02-12 17:31:56

You lost me at codebrowser but looked really cool! Wow you so smart

0 likes
Jovan Babic 2020-02-19 10:40:21

Where did you learn these skills?

0 likes
hartzaden 2021-02-01 15:47:30

so hold on, the man trying to track the infection vector killed this by registering the domain it was calling?

0 likes
Replies (1)
Elliot Melloy 2021-02-09 14:39:54

Yep, it's well documented but I don't think we know if the author made a mistake or did it deliberately, it's not like they can easily be interviewed about it.

0 likes
Thirsty pooch 2019-05-01 08:35:29

Yes, yes ! love it !

0 likes
Антон Лисненко 2019-04-04 07:44:02

Awesome!

1 like
Marco Ris 2019-05-24 21:06:54

Verstehe erst noch Bahnhof, aber ist ein interessanter Kanal. Weiter so!

0 likes
Miroslav Nečesaný 2019-04-04 20:16:11

Damn, this is how genius sounds like

2 likes
Stevens Garage 2019-08-17 23:17:29

PART 2!!!!

0 likes
Ben Kallsen 2020-05-19 18:33:24

What a cliff hanger, we'll see why it downloaded Tor in the next video??

0 likes
RAIDEREHY 2020-02-09 13:12:33

Thanks for sharing

0 likes
S B 2019-04-18 19:53:07

Very cool!

1 like
NCG 2021-05-26 07:11:10

An intelligent person created wannacry and another intelligent person decodes it

0 likes
i-use-arch-btw 2019-05-08 12:46:15

WannaCry: exists

Ghidra: im about to end this mans whole carrer

515 likes
Replies (9)
Xyphoes 2019-05-09 14:53:17 (edited 2019-05-09 14:53:27 )

what the H E C C is a carrer

7 likes
glowing one 2019-05-11 19:39:07

@Xyphoes it's a carrer

1 like
Xyphoes 2019-05-12 04:10:02

@glowing one isnt it meant to be a career tho

4 likes
glowing one 2019-05-12 04:25:02

@Xyphoes no this is much different.

5 likes
Quaint Falopa 2019-05-16 20:19:03

but wannacry isnt a man

1 like
meph 2019-05-18 11:13:00

Wannacry: haha my files now boy

Lucky: hold my files

3 likes
Screen Patch 2019-05-22 09:01:10 (edited 2019-05-22 09:01:23 )

Ransom company*

0 likes
Henrik Andersson 2019-05-23 02:58:40

Sorry, that was the kill switch. Which was already found.

0 likes
Stefan Madethen 2020-11-30 13:57:57

stop djvu: am i a joke

0 likes
Inferior 2020-02-29 03:37:12

but then you realize you are running a daemon that backups ur files on google drive.

0 likes
Ultralagger R.E.V 2019-04-20 04:15:12

Try WannaCry vs McAfee Ransomware Interceptor and 360 Ransomware Decryption Tools

0 likes
TheConSept 2019-05-18 01:11:31

I do not know anything about coding. but what I gather is this malware has a means of creation on top of creation with a fail safe. but as far as this video goes it only touched on the random generated password that it must create and store, then send, and delete. Which is why some people say you can capture the password to unlock and decrypt everything in memory if you know where to look.

0 likes
NextGeneration9501 2021-01-07 15:02:43

Sending money to the hacker

Error: The user is no longer exists. Please check your bitcoin address whether it is entered correctly.

1 like
Abdullah Algurashi 2019-03-27 21:29:40

Awesome 100%

2 likes
Paprika 2019-04-02 19:15:17

man, this was a trip

2 likes
Oscar Paguada 2019-06-14 01:51:55

Decompiling explained well

0 likes
Akotski1338 2021-02-05 08:34:18

This happened it 2017? I must’ve been living under a rock

0 likes
jakobcoder 2022-02-07 19:30:26

what is that program for the keystrokes

0 likes
Vishvesh Karthik 2019-04-28 13:15:47 (edited 2019-04-28 13:15:57 )

I'm curious about what's on the other side of those onion links

0 likes
한국어의 이름이라면 강하게 보이지? 2019-03-30 17:19:32

Good video but its so difficult for me... sad

2 likes
Ori 2020-03-06 14:39:33

To think that somebody wrote this entire software is mesmerising.

0 likes
Evan Yoohoo 2021-02-01 15:50:10

Why do they concatenate so much strings at runtime?

0 likes
powerfrog 2019-05-14 04:40:31

I almost fell asleep watching this video just because of this guy's beautiful asmr voice

0 likes
Johnny Kat 2019-05-12 04:48:15

I didn't understand anything but i really like this video!!

0 likes
James Bond 2019-04-01 02:53:38

1) Is it true, after payment and receaving key you can get your files back?
2) Does wannacry spread accross entire SMB even if SMB requare password?
3) Can you find a key in source code after reverse engineering or for each pc key willbe different?
4) Is it possible create a tool to restore files to original state before PC got infected?
5) What is the domainName trigger to prevent wannacry infecting a PC?

0 likes
Replies (1)
RmFrZQ 2019-04-04 22:14:41

1) There is no guarantee. Even if crooks will send you a decryptor app with a valid decryption key, there is always a chance it could partially fail or won't work at all. Don't pay ransom. Report crimes to your local police.
2) Only if affected PC has mounted SMB share as network disk at the infection time.
3) Encryption key is generated at runtime and is different each time. When encryption process will finish, this key will be sent to crooks via internet.
4) No, because you don't have valid decryption key, and attempts to generate one could take years of computing time.
The only real way to recover files is to restore from backup, or VSS snapshot if it is available, when infected PC was cured.

0 likes
2Radix 2022-06-12 14:58:00

can you recommend some book to learn this?

0 likes
PirateTHESteam1 2019-05-16 16:21:59

So the killswitch-URL in question was stored in plaintext in the program?
Why wasnt it encrypted?

15 likes
Replies (1)
Trimint Pikachu 2019-05-17 07:43:17

Because not many people is an expert at coding.

1 like
Chabache 2020-03-17 06:57:05

Love that!!

0 likes
JustOne 2021-07-23 05:03:55 (edited 2021-07-27 05:06:31 )

"if you have ever reverse engineered"- Nope, I can't even figure out how to pull up the terminal.

1 like
Vedistaan Windrunner 2020-02-11 03:11:58

Bro, You really are a ninja :O

3 likes
Yushun LIU 2019-05-11 18:00:14

Looking for Part2

0 likes
zach scratcher 2020-10-04 09:23:51

I want to specialize in ransomware im about to take coding classes any other tips? beside cyber security

0 likes
Dragiux 2019-04-19 15:18:12

what if you reverse engineered hydra with hydra

0 likes
techguy921 2021-04-16 16:12:33

Why virus exe is in a plain code? No themida or vmprotect

1 like
Dániel Bulyovcsity 2020-02-26 20:58:08

the bitcoin wallet in the malware has 179 transactions with total 19.55 bitcoin

0 likes
rob morgan 2020-01-17 19:07:39

When is part 2 coming?

1 like
Replies (2)
stacksmashing 2020-01-17 19:10:04

Kind of waiting for the Ghidra Debugger - cause so much happens in parallel..

1 like
rob morgan 2020-01-17 19:17:43

@stacksmashing Glad to hear you didn't give up!

0 likes
Propop pop 2019-06-04 21:21:46 (edited 2019-06-04 21:24:18 )

I heard many say it's made by the khorens but looking at you anaslize I don't belive that for one that's a default program starter and let's admit it wanna cry is a bad use of a good exploit even windows thinks it's scetchy like it appears in program manager good vid though I don't understand this but you helped

0 likes
Innovative Noob 2019-06-02 05:29:54

can someone please suggest me some more good channels like this?

0 likes
The Timetraveler 2020-02-09 10:43:01

I have VMPlayer, the default and i wanna run viruses but i'm not sure that my host computer will get infected too. I tried looking it up on Google but some say it does, some say kinda and some say no. Anyone has a clear answer??

0 likes
likfrikbik 2020-02-07 23:17:47

Translation of this video:
Never run unknown .EXE files.

0 likes
Replies (1)
stacksmashing 2020-02-08 08:38:02

That’s incorrect, wannacry also spread via EternalBlue

0 likes
Nicht Fürdich 2020-02-17 23:39:11

Die Maleware hast du geknackt, aber der Akzent bleibt der größte Gegner 😂

1 like
Replies (3)
stacksmashing 2020-02-20 23:49:57

Lässt sich auch so schwer reverse engineeren!

0 likes
CoolKoon 2020-04-12 16:07:35 (edited 2020-04-12 16:07:57 )

Oh come on now! That accent wouldn't prevent him from becoming even the governor of California if he wanted to :P

0 likes
stacksmashing 2020-04-12 18:30:28

I should look into that! 😄

1 like
Null 42 2021-04-07 01:17:06

good so this means that we can uncrypt the files right?

0 likes
Rahul 2021-04-02 17:02:38

Which VM did you use to analyse the wanacry binary?

0 likes
Replies (1)
stacksmashing 2021-04-03 11:45:19

VMware Workstation

1 like
Wildan M G 2021-01-14 02:42:13

My Dad : do you want to hack tiktok ?
Me : of course , let me know dad.
My Dad : use wanncry
Me : WTF!, NSA

0 likes
Toffees 2019-03-28 18:00:28

Please dont speed up the editing. It makes it hard to understand when you are learning from watching.

15 likes
Replies (2)
Marten Faro 2019-04-01 19:04:24

slow down the video

14 likes
babybirdhome 2020-02-14 05:03:11

I think you probably don't really want to watch a video that's 3 days long, but I understand. It would probably be useful to make different kinds of videos, some like this where he explains the techniques being used and why, and others where he slows down and explains the techniques and why you use them where you use them.

0 likes
Cy Beri 2019-10-23 10:42:32

HI ,whats the password for the zip file ? WNcry@2017 NOT WORKING

0 likes
Lux gil 2019-04-04 14:06:38

You ma boy are very stronk in what you're doing. Nice!

1 like
Lashy YT 2019-04-17 16:11:14

This is interesting video I’m current learning Python

Is this relevant

1 like
Replies (1)
JackAttack 2019-04-18 03:26:23

The application is not in Python.

0 likes
Βеʀƙ Ӧzcẫñ 2019-04-20 23:12:26

Why don't you use IDA pro for this purpose?

0 likes
Olivia Smith 2019-04-28 07:23:13

Please tell me
What are the perquisites to understand the video ..😖

0 likes
pascal narcos 2019-08-12 06:15:02

Thanks !

0 likes
Shawn solo 2019-04-03 10:08:07

I didn't know about reverse engineering. I am beginner can you teach me about reverse engineering.

10 likes
Replies (1)
Reckless Roges 2019-04-04 09:30:13

Watching, (and recreating Ghidra Ninja's videos) will teach you a lot. I would not start by copying this video as Wannacry is toxic. Learning by doing. Try downloading your CPE router firmware and try cracking that.

0 likes
NadavLN 2020-07-12 09:48:39

Where did you get an outdated Windows 10 VM?

0 likes
Amanda Mate 2019-03-31 21:58:00

what kind of machine is this youtuber? jesas fck this fast and accurate analysis makes my head xplode

59 likes
Replies (5)
stacksmashing 2019-04-01 15:02:54

Reported and removed, there is no room for stuff like this on here :)

4 likes
urugulu 2019-04-01 15:26:21

@stacksmashing and also not for the answer of that other random guy calling the guy in the already deleted comment a waste of Oxygen. not all People are capable of following this type of Content not even developers that are already programming for a very long time. i guess in this case calling you a "machine" is somewhat of a compliment although a rather dubious one.

2 likes
Chris Wright 2019-04-02 12:17:23

@urugulu Did you see the comment that I was replying to. It had nothing to do with the video and was just an unprovoked attack on someone minding their own business.

4 likes
Jake 2019-04-02 17:58:27

@stacksmashing what

1 like
bob smith 2019-10-31 23:47:53 (edited 2019-10-31 23:49:11 )

you would NEVER make a good REV eng... your observation skills are poor...
1. Tool bar top (NOT windows), OSX or linux
2. Apple logo top left
3. APPLE finder logo left tool bar top

0 likes
RandomThingy 2020-12-21 22:41:30

how did he learn to do this?

0 likes
IDontModWTFz 2021-06-25 07:57:54

15:04 is a weird spelling under the cursor

0 likes
Seby 2019-05-19 16:54:28

imagine wannacry on nasa computer

0 likes
Mario Toledo 2020-02-19 17:50:53

My Computer : Randomly installed WannaCry
Me :
-Download rufus
- Create Bootable Flash drive
- Download windows OS
then
Clean Format,

Done, wannaCry no more

0 likes
HansJ 2019-04-10 14:35:39

I love your German Accent!

0 likes
Davy Erni 2021-04-01 00:47:05

did you know you can just unplug the system and restart normally .

0 likes
Replies (1)
DeeJay1210 2021-09-05 05:40:12

🤣🤣🤣🤣🤣 🐂💩

0 likes
SSSLink 2020-11-30 19:21:36

Someone pls help me reverse engineer Navi trackers to find its unused map select

0 likes
Aidan 2019-04-01 13:04:34

This is great, I'm always surprised by new hacking channels every now and then. Listening to your voice, it sounds like you're German, am I right?

1 like
Replies (1)
sickysore 2019-04-01 20:48:24

maybe french?

0 likes
Susanta 2019-05-22 04:47:19

I can ruin my machine again... Rename wannacry to wanasmile😆

0 likes
Kristian Klotzbücher 2020-12-04 07:22:39

"let's jump into the function" sounds kinda cute to my german ears :)

2 likes
Brodie Nelson 2021-01-05 22:31:43

Anyone experienced with dx11 injecting? Or should I just go ahead and say it... making game menus

0 likes
Zran ali Khan 2021-01-06 21:37:25

Can u please help me to decrypt my files that r encrypted by ramsomeware

0 likes
trollo 2021-03-30 20:50:41

Can you reverse engineer the pupbg ransomware

0 likes
jim jimx 2020-05-08 12:15:06

I tried to download wannacry to my MacBook, but couldn’t.

0 likes
respected mastermind 2019-04-14 11:59:39

Almost asmr <3

3 likes
Dont Tar 2021-01-09 19:55:43

What do those onion address lead to? The dark web?

0 likes
ROCKER19943 2019-05-30 07:43:09

Damn you're smart! where is part 2 though ?

1 like
PortalArmy 2019-04-06 11:37:40

Abra, Kadabra, Alakazam,
You now possess a new subscriber,
Simsalabam.

10 likes
Grimm 2020-12-19 10:59:59

I FINALLY UNDERSTAND THESE VIDEOS LETS GOOOOOO

1 like
Replies (1)
Hayden Simper 2021-01-02 01:43:33

It only took 1000 re watches!

0 likes
Connor Teige 2019-04-04 15:21:56

I need MOAR

1 like
Linces Marques 2019-07-27 18:29:27

Fucking Amazing man...

0 likes
SuperNova 2020-02-08 20:00:17

I understood an impressive amount of 0% of the video

0 likes
123AMG 2019-04-16 11:16:26

Part 2... GOGOGOGO

0 likes
Ryan Torrie 2021-02-28 06:54:39

It’s a program I thought it was a virus

0 likes
Макс Ф. 2020-04-09 20:39:12

Wow! It's interesting.

0 likes
Engineer Gaming 2020-12-31 19:22:10

Java_run;board.if=-1

0 likes
Gaston 2021-03-11 00:59:07

Yeah I understood everything

0 likes
haimsadia 2019-04-03 06:10:46

How do you learn to do that sorts of stuff????

1 like
Replies (1)
Ben Alkan 2019-04-03 12:16:27

I guess he first learnt to code in C, then practice on basic programs

0 likes
CyberMew 2021-01-09 09:35:02

So what’s that URL at the start for?

0 likes
Hogg Play 2021-03-31 22:27:42

Ooops! Your files have been encrypted!

This dude: No no no. I’m sorry. Your files have been encrypted.

0 likes
Replies (1)
DeeJay1210 2021-09-05 05:42:18

So is`nt the second sentence just a repeat of the first sentence ? I`ll do what we normally have to do on YT and make an assumption....... Do you mean this ? :

Ooops! Your files have been encrypted!

This dude: No no no. I’m sorry. It`s YOUR files that have been encrypted.

0 likes
Psilocybe Vibe 2020-02-19 05:30:18

Notif :- wannacry bla bla something....
Me :- hell yeah ! I will learn about it now throughly....
*after watching 5 minutes of Ghidra Ninja saying shit like “stack buffer”, “function is easy”.....
Me :- existential crisis.

0 likes
Dutchy Gaming 2019-04-06 17:12:07

what program u use for doing this for seing the source of it ?

0 likes
Replies (4)
stacksmashing 2019-04-06 17:12:29

Ghidra

0 likes
Dutchy Gaming 2019-04-06 21:57:07

@stacksmashing i did see it it isn't for windows :( but i'm working most of times with charles fiddler wireshark ILspy ollydbg and other applications awesome tutorials btw

0 likes
stacksmashing 2019-04-06 22:00:15

Thank you! Ghidra is available for Windows - just click the .bat file in the download.

0 likes
Dutchy Gaming 2019-04-06 22:09:11

@stacksmashing i did try but error message with java pops up so i need take a look at it if i got time

0 likes
GamerSec 1337 2019-09-22 03:36:20

can you give me wanna cry source code?

0 likes
Dziki Bill 2019-04-04 05:33:37

One day I wil understand what the heck are you doing and then ... I will be happy :-)

3 likes
خليل شريتح 2019-08-27 11:00:01

where is part 2?

1 like
realcygnus 2019-03-28 19:58:30

top notch

2 likes
torressr3 2019-04-15 11:11:00

Where's the second part?

0 likes
FarJustice 2019-03-29 00:48:12

daaaamn and i can't even reverse calc.exe

1 like
Harune 2019-04-01 16:26:07

awesome

1 like
Hansy 2020-02-06 20:00:08

Wait.. I had already seen this one. Oh well.

0 likes
H3xad3cimal Dev 2020-02-10 01:36:13

I want to make a reverse engineering tool like Ghidra or a tool to view the assembly code of a program can someone help?

0 likes
Replies (4)
SerBallister 2020-02-11 06:32:56

You want to write your own ? You'll need to be familiar with the CPU architecture you're dealing with, I would start by writing a disassembler.

1 like
H3xad3cimal Dev 2020-02-20 21:43:00

@SerBallister I'm already understand the architecture (Windows 10) but I'm have a problem of translating it to code to actually and try to extract some assembly instructions

0 likes
SerBallister 2020-02-22 07:33:56 (edited 2020-02-22 09:08:28 )

@H3xad3cimal Dev In that case start by studying the structure of the executable format for exe files. With that you will be able to locate the ".text" sections which contain x86/etc instructions. There will be a lot of other useful data in there like references to OS library calls/etc which will be a start toward reverse engineering it

0 likes
H3xad3cimal Dev 2020-02-24 23:20:59

@SerBallister ok thank you. I am grateful for your help

0 likes
miust 2019-04-16 19:23:42

I didn't understand anything, but you motivate to start

0 likes
DEAD POOL 2021-01-07 13:07:17

2:08
What name of this program

0 likes
Replies (1)
stacksmashing 2021-01-07 13:26:21

Ghidra

0 likes
testplmnb 2019-04-04 15:18:40

i wonder if wannacry author watched it :D

31 likes
Replies (3)
Josh H 2020-04-02 10:17:08

Nsa? Of course

1 like
Falaxuper 2021-02-04 13:47:14

@Josh H It was made by North Korean cybercrime organization codenamed 'Lazarus'

1 like
LowRhyan 567 2021-02-16 06:39:24

It probally have more than 1 author

0 likes
Al 2019-04-04 17:21:06

dude, to day i am tired.. but after your video i feel devastated.. LoL

1 like
Mattia Pergola 2019-04-27 13:48:53

Second part?

0 likes
匿名 2020-02-23 14:14:42

I like your video

0 likes
Kate Wolf 2021-04-12 18:38:30

I don’t know any C++ but this was an interesting video still

0 likes
Replies (1)
DeeJay1210 2021-09-05 05:34:14

Only thing I know about "C" is that it scares the hell out of me cos I cant swim !

1 like
TrägeOS 2019-04-11 21:32:07

Du bischt 1 nice Typ!

3 likes
lunatic955 2019-12-16 12:10:15

Where is part 2?

0 likes
Akoltin 2019-05-24 21:47:47

Captions, please.

0 likes
David 2019-04-14 12:45:06

is it secure to do this in a vm can the root os ever get affected

1 like
Replies (1)
babybirdhome 2020-02-14 05:09:13

David Buckley there are always VM escape exploits that can get out and infect your host operating system, but you are very unlikely to ever encounter one in the wild. And even if you found one, it would probably be tailored to a very specific virtual machine and version. It isn't 100% safe but it's pretty safe. Your biggest danger is probably user error where you accidentally forget you're in the host OS instead of your lab VM and accidentally infect yourself. Or not setting up your virtual lab environment correctly to be safe.

0 likes
TheShermanTanker 2020-02-21 18:34:20

How in the world did you even manage to decompile a binary??

0 likes
Replies (1)
stacksmashing 2020-02-21 18:36:30

Ghidra!

0 likes
PwnySlaystation01 2019-11-15 23:22:23

I'm dying of old age waiting for part 2

0 likes
akhi dot cf 2019-05-08 15:13:21

Bravo

0 likes
Huy Khánh Bùi 2019-05-12 14:28:55

The FBI wants to know your location.

0 likes
TEMİZ - 5 çöp kanal 2020-02-10 16:14:14

excuse me wtf i tried to unpack it and my drives are encrypted (thats a joke)

0 likes
Lindot with akei 2019-05-10 12:44:37

Can we have WannaDie? It encrypts your data and it deletes it.

0 likes
Zane 2019-11-13 22:21:37

Please make new videos

0 likes
G M 2019-06-05 09:38:57

Where's part 2?

0 likes
The 19th Fighter 2020-02-09 10:58:30

the fuck? I have expected it to be packed or encrypted in some way, if "normal" executables already are.

0 likes
Stefan Madethen 2020-11-30 13:55:34

ok
now do this with stop djvu and its variants

0 likes
μ 2019-06-01 22:40:04

Instructions unclear bios encrypted

0 likes
Ashok Vj 2019-04-03 17:33:13

Broo great videooo

1 like
Sigma Bull 🍥 2019-03-27 16:34:40

please do crackmes lvl 1 sir!

3 likes
Replies (3)
stacksmashing 2019-03-28 11:12:55

Do you have a specific one in mind? I did a level 1 crackme here: https://www.youtube.com/watch?v=fTGTnrgjuGA

0 likes
Sigma Bull 🍥 2019-03-30 06:45:15

@stacksmashing yeah I have watched it 4 times, When I tried other it's difficult to connect dots , can you do a video ,how to detect patterns in each level ,ur wannacry vedio is awesome

0 likes
Sigma Bull 🍥 2019-03-30 06:51:27

@stacksmashing sir I have a query,I inject connect back payloads in wild , which ty mainly locate at system32 folder,can forensics can reverse engineer the exe file and find my connect back ip and port address?

0 likes
GirthFromBirth 2020-08-31 21:27:41

Can i do the same with IDA pro?

0 likes
Replies (1)
stacksmashing 2020-08-31 21:28:05

Why not? :)

0 likes
Mihail-Cristian Munteanu 2019-05-05 14:39:45

What's happening with the channel? I've been wating for one month to learn, yet no part 2

1 like
Massimo Mengarda 2020-05-08 18:55:26

How did you know that HINTERNET was a void * type?

0 likes
Replies (2)
stacksmashing 2020-05-08 22:06:50

I got it from the WININET.H header file - in it you can see that HINTERNET is a typedef to an LPVOID (which is Windows speak for void pointer): https://github.com/jandubois/win32-internet/blob/master/WININET.H#L40

0 likes
Massimo Mengarda 2020-05-09 11:00:57

Oooh, ok thank you

0 likes
kartoffelwaffel 2019-04-21 03:28:56

your name is well deserved!

0 likes
James Bond 007 2019-07-15 17:19:43

Y put a kill switch in it 😂

0 likes
Kadir Lofca 2020-02-09 00:38:41

Lmao they even wrote Bitcoin accepted

0 likes
Lol Sucks 2020-07-14 10:41:33

I got scammed by someone when buying cheats he sent me 2 programms and I dont know if those are viruses or not. Can you make a video about those 2?

0 likes
Replies (3)
stacksmashing 2020-07-14 10:57:21

Simple fix: learn to play instead of cheating.

0 likes
Lol Sucks 2020-07-14 11:02:25 (edited 2020-07-14 11:02:34 )

@stacksmashing Cause everyone is cheating in that game. But I dont care I just wanna know weither or not it is a virus and how I find it out.

0 likes
Lol Sucks 2021-01-09 08:48:12

@Mehdi Choukri Other people are cheating in shooter games so its not fair.

0 likes
Advaith Madhukar 2019-04-24 02:31:46

where`s part 2?

0 likes
hacker king games 2020-07-28 11:40:08

please can you recorde video for how to make virus wannacry

1 like
Kaan ALBAYRAK 2020-06-12 08:26:57

you know this job buddy
i need help on a subject too. Can you help.

0 likes
Ryan Torrie 2021-02-28 06:53:25

record my videos and then play them back at double the speed and narrate it at double the speed that I actually did it...

0 likes
TheSuperHybrid80 2019-04-22 23:08:49

hey can you dummit down for normal people a little like why you do this it hasent have to be end all but just like this makes the . exe to think that 69859.juti is not working .cos now its really intresting but my understanding is just so limited in compaliers and shit good vid keep it up subbed

0 likes
TVP MUSIC 2019-04-02 19:39:30

So basically if you open that domain name wouldnt the virus stop????

0 likes
Replies (1)
TVP MUSIC 2019-04-02 19:39:54

Oh thats why the video says 'kill switch' lol

1 like
Kick Ass Videos 2020-05-19 16:51:25

dein englisch ist echt gut :D

0 likes
Dima Pavluchenkov 2019-07-14 11:23:03

secure your PC by Romad, no one cry then)

0 likes
Sushrut Puranik 2019-12-17 21:07:17

Where's part 2

0 likes
More and row 2019-05-30 13:01:50

Only part 1? :s

0 likes
Jackomojo 2021-03-08 05:13:37

This guy sounds just like Shounic with a better mic and slightly deeper voice

0 likes
ejonesss 2019-04-01 23:57:26

you are on a mac either you are using a hackintosh or WannaCry now has a mac version or you are doing the work in a virtual environment like vmware fusion

0 likes
MADX FALCON 2020-02-11 23:36:22

i was afraid to play the video 😂😂😂

0 likes
haMzandCheese 2020-02-25 22:01:00

I wish i could understand this. I WannaCry.

0 likes
Wayne Modz 2020-04-30 16:37:14 (edited 2020-04-30 16:40:44 )

I have thing i need disassembled. Its a small routine... im willing to pay :) can you help... well ive disam it. I need to know what its doing

0 likes
## 2021-07-01 07:11:47

You're german right?😅 Ich hör deinen Akzent💁🏻‍♀️

0 likes
Wayne Woolsey 2020-12-23 14:23:47

lol. "try not to encrypt all your files. "

0 likes
DM 💥 JIGGYPASS On IG 2021-10-23 01:19:14

He's the best indeed 🖕 mine works perfectly fine thanks dude 🗝️

0 likes
Harrick V Harrick 2019-05-10 19:07:40

Dude, could you maybe try and get yourself a new and better microphone? You would do all us all a pleasure, tx!

0 likes
Schwellhaim Bass Riot 2020-12-03 18:09:26

reversie tool developed by nsa that supports 6502 amd 8051? yeaaahhhh... luvlie

0 likes
blueclay 2019-05-18 09:28:05

Wannacry: wanna cry?
Me:no u







I wanna cry

0 likes
Vinesh Majethiya 2019-08-20 17:25:14

Create More Videos

0 likes
gxc 2019-09-09 21:16:52

Why the fuck would they store a killswitch url completely raw and uncrypted?? Though chinese hackers were supposed to be smarter than that :thinking:

0 likes
Harune 2019-05-09 20:38:07

I want to know what's next dude, hurry up

0 likes
Lostinmyway 2019-05-18 08:08:33

Would really like to see some rat r e

0 likes
Caleb Croney 2019-04-07 13:36:51

Wow, I could barely keep up with what you were talking about.

1 like
world knowledge 2020-02-06 17:47:09

Simple as messing with execryptor back in days. my heart is growing when i see people still doing RCE. unfortunatly nowdays ppl know only how to use insta, fb etc... thats shame. i remember good old days when we re using forums exetools, SND, crackme.de site for doing chalenges and sharing knowledge then was no YT tutorials like today, today u can dig hw to make nuke bomb, then we ysed IRC, GTALK, forums was platform for crowd pdf and .txt tutorials , also not to forget zine 29A im one of the writers i wont tell my identity. public . seemts like we dinosaurs who learn so to say self learn and made it to perfection in the age where is no everithing availble on YT like today and today kids re dumb. all we haven at those days, dumpers, ollydbg, softice, peid, import rec, api functions to study, masm, tasm, after ida pro was come , from nothig we all generaly learn most of all exist languages, cryptografy, asm crytion thing to do rce , and many many more.. im missing this good old days. anyway accident found your channel, undertand what u talking about im in this things since razor 1911. older then most of this audience. but just to support what u doing, my msg to young ppl is to studdy this tutorials, for us is simple for u is treasure, back in days we were no having such tutorials. and sorry for gramatical errors tomuch vodka today . one more thing having private clection of p;ugins non public for personal use starting from olly dbg, cuustom, scripts and tools, unpackers custom made debugers, dissamblers better then ida pro, , lots of scipts and plugs, if u want i can gift u for support for channel bcz im happy to see someone has nerves to teach youngs this days, i lost my nerves around 2006 ithink when themida was removed virtualisation at one given point. bcz ppl ask dumb questions

1 like
Crovax HDD 2020-02-26 11:50:55

i'm ignorant as a goat about this, but i find this voice quite relaxing and soothing

0 likes
The Browser Pirates Team 2019-04-02 14:37:50

Wait a minute, so basically you can see the source code in a .exe?

2 likes
Replies (2)
stacksmashing 2019-04-02 14:41:36

It reads the machine code and tries to generate source for it - so it's not the original source code (and it also often fails to generate something decent). But it can make analysis much easier/faster - the process is called decompilation. :)

1 like
The Browser Pirates Team 2019-04-02 15:02:51

@stacksmashing thanks bro, going to install this on Kali Linux :)

0 likes
Destro Oner 2020-08-04 16:11:43

Yo so what if you dont have the admin password then what

0 likes
MelonHeadWT 2021-07-09 18:21:42

im the kind of guy who see this kind of videos, click afap, watch, dont understand anything.. but go to part 2

0 likes
Replies (2)
DeeJay1210 2021-09-05 05:23:34

Lets hope you`re also not the kinda guy who randomly clicks on links to Wanna😭 and ends up execting it on his personal P to the C.

1 like
MelonHeadWT 2021-09-05 22:48:15

@DeeJay1210 since english isnt my mother language, i cant tell if i get what u mean, but i can assure u, im not sump to be fooled y some stupid scam.
i wont fall for this kinda things

0 likes
Ashi 2021-01-28 04:36:22

I understand nothing and everything at the same time

0 likes
Mc Skeptic(Check Playlist) 2021-01-10 13:24:09

Me downloading coc hack :

0 likes
Nishan Maharjan 2019-03-28 09:40:56

Liked this

1 like
Monkey Robots Inc. 2021-03-30 07:47:53

u expect me to know wtf ur saying?!?!? this is WAY over my head.

1 like
Nitro Zeus 2021-04-10 02:50:08

Nice

0 likes
Ruthvik S S 2020-02-23 13:14:28

SO Wanna Cry Is Gong to Cry NOW

0 likes
Matt 2020-12-31 21:28:47

my man said uno reverse card

0 likes
0xFrijolito 2021-01-23 01:00:47

wannycry is not packed?

0 likes
Captain XLAB 2019-12-15 18:04:45

lmao C:\Windows everywhere. What if someone had windows installed in D: for example :v

1 like
Replies (1)
Pimp 2020-10-14 10:36:16

Imagine writing ransomware and it fails because Windows is installed on D:\ what a bruh moment that would be.

1 like
malicious minecrafter 2021-02-15 04:55:55

This Guy is the second version of enderman but good

0 likes
Vietboy Gamer 2021-01-01 12:37:27

Plot twist this guy is the creator of wannacry

0 likes
Technocraft Studio 2022-03-06 18:01:45

Nice

0 likes
dellasxig 2020-02-11 11:16:32

Why did I click this video and watched the whole thing even tho I don't understand what he's saying.

0 likes
LX 2020-12-22 17:20:12

vielleicht solltest du für google oder so arbeiten omegalul
nices vid!

0 likes
Mamba 2021-02-24 10:20:10

Always the slight german accent

0 likes
Toge Inumaki 2021-06-06 10:17:21

I Wannacry cuz my computer is getting slower :(

0 likes
Blue Reino 2020-02-13 01:47:54

When you have no clue what is going on, but somehow end up watching the entire video and keep shaking your head as if you understand...

0 likes
Twitchy 2020-02-12 09:43:16

welp internets fucked. epople gonna start sending out the virus

0 likes
Saeed Mahmoodi 2019-05-30 20:34:28

i still wa8ing for new video

0 likes
Nice 2019-03-27 20:35:04

<3

4 likes
Replies (1)
Nice 2019-03-27 20:35:14

learned mutch new things :D

2 likes
Neut 2019-04-03 00:01:07

wow...

1 like
YoEditmusicGuy Cutout 2020-02-24 23:03:13

All you do takes parts off

0 likes
Zerix 2020-02-12 16:32:32

So he is basically pulling the uno reverse card on wannacry

1 like
Calub Veim 2019-04-05 19:11:53

do notpetya next!

2 likes
Lyric Box 2020-05-03 02:15:10

Can I do this in Ida Pro.....?

0 likes
Replies (2)
stacksmashing 2020-05-03 09:45:09

Sure!

0 likes
Lyric Box 2020-05-03 09:48:56

@stacksmashing sir, how can i contact u

0 likes
Eric Agbayani 2020-03-15 21:14:21

hey guys i'm new to this stuff. Why are you changing every function name? is it because your trying to make sense on whats going on?

0 likes
Replies (1)
stacksmashing 2020-03-15 21:14:40

That’s exactly it!

1 like
T4iga 2019-04-24 08:21:49

I don't yet understand why anyone would program ransom are like this. Why have it depend on a domain someone can simply register to make it stop?

0 likes
Replies (1)
Adrian Dostoevsky 2019-04-26 19:13:38

It's a kill switch.

0 likes
Alberto Barbosa 2020-07-12 15:33:51

im a noob. can you Ghidra Ghidra?

0 likes
V 2020-02-10 19:34:09

how to make a wannacry2 ?

0 likes
Replies (1)
stacksmashing 2020-02-10 19:46:05

It’s out!

0 likes
Notch Apple 2021-07-06 18:19:28

is it just me or is he talking too fast

0 likes
vnc t. 2022-03-11 20:06:24

turns out removing wannacry is just a few clicks if you know what you are doing

0 likes
Replies (1)
AerGlass 2022-03-15 16:15:50

lol if you have the decryption key

0 likes
Shawno Gman 2019-12-29 02:36:16

Where the second video?!

0 likes
James Bond 007 2019-07-15 17:20:19

Look at $hine$ecurity chaos.bat file ;)

0 likes
Cornea Valentin 2020-04-20 17:32:43

lol , dude you have broken tv :))

0 likes
Shoツ 2019-04-03 16:27:50

I am super interested, but I dont know anything about all that :c

1 like
Raihan Rabbani 2020-02-14 10:08:42

idk what he talking about, but goodjob

0 likes
Twobob Club 2021-05-24 01:11:16

<3

0 likes
Replies (1)
DeeJay1210 2021-09-05 05:29:26

4>

1 like
dubsterbryan 2020-05-07 06:22:35

i like what you have done. i suggest you see what you can address on shadow banning in twitter. basically i am asking you to focus on censorship in anyway you can. we need freedom of speech. i am guessing you know alot more on this than me so let me know what you can do.

0 likes
Piotr R 2020-01-24 18:43:45

no part 2, r u still buying bitcoins to pay the ransom?

0 likes
george fridman 2021-02-05 21:41:45 (edited 2021-02-05 21:50:23 )

dont understand what was the idea to write this in C/C++, like ok they used very low lang. bla bla, but for such task as encrypt , write in python in 10 min, sometime sophistication is not worth the time, and how many people actually paid.

0 likes
Replies (1)
tappineapple 2021-03-14 07:16:52

Its doing more than just encrypting the files.

0 likes
Marios Zlatanos 2021-02-06 15:00:26

hmm i know some of these words. Interesting non the less.

1 like
Replies (1)
DeeJay1210 2021-09-05 05:50:13

Yeah, when I talk about music production people hear this - https://www.youtube.com/watch?v=38cmHS4hpaw

0 likes
Christian Leonardo Vergara Marin 2020-12-25 22:13:03

you are pretty smart

0 likes
MsUncleKevin 2019-04-20 18:33:52

interesting.

0 likes
Awwwmac 2020-02-09 02:33:19

Man, what are you talking about??? This some kind level of highest language xD

3 likes
Onaterdem 2019-05-16 08:38:24

while(iVar2 != 0){
iVar2=iVar2 + -1;
(...)}

YUCK what kind of a coding practise is this

4 likes
Replies (5)
Chris Chavis 2019-05-16 15:23:20

I'm a newb to coding but I've seen a lot of ppls code and really disagree with it lol. I guess I have my own certain type of style? I know from what I've learned that basically computers use addition to subtract by default? So when you tell the compiler 8-5 it's 8+-5 anyways? I think they made it that way for optimization. But as far as styling goes? idk,


I'd write that code myself like this lol:


While(iVar2 != 0)
{
iVar2 = iVar2 + (-1);
}

0 likes
Gyarik 2019-05-17 12:44:58

@Chris Chavis iVar2--;

3 likes
FishlandicFishy 2019-05-19 14:38:38

What it means:
While the variable ‘iVar2’ is not 0 and iVar2 + -1 = iVar2 (which basically didn’t work)

0 likes
HenryRichard 2021-05-14 08:04:24

I assume it’s interpreted from the machine code in whatever way is most basic - so no syntactic sugar or even for loops. I don’t think anyone actually writes code like this.

0 likes
Onaterdem 2021-05-14 12:16:08

@HenryRichard You're right, it's probably just a decompiler thing. while(iVar2--) shouldn't be out of a malware coder's reach

0 likes
Levi 2019-04-13 21:13:36

that shit complicated

0 likes
Wisesa 2019-11-10 13:26:50

Update?

0 likes
DeeJay1210 2021-09-05 05:20:16 (edited 2021-09-05 05:42:39 )

"Please be careful when using it..... try not to encrypt all your files", I wont have that issue because I WON`T be using it, ESPECIALLY not on a P.C with personal files on it 😂

0 likes
Anonymouse Cyber 2021-01-06 13:28:57

Wher can iget this virus for educationelpurpose

0 likes
👉🏾JIGGYPASS ON INSTA 2021-10-23 00:43:41

I only 🖕 recommend him for he's genius and realistic 💯

0 likes
👉🏾JIGGYPASS ON INSTA 2021-10-23 00:43:31

I only 🖕 recommend him for he's genius and realistic 💯

0 likes
【ハンス・フリッツ】 2019-04-08 00:45:24

Am I hearing things or does he sound German?

0 likes
Replies (1)
【ハンス・フリッツ】 2019-04-08 00:49:27

Regardless, this was one of the most interesting videos I've seen in recent times.

2 likes
Svingarm 2021-03-18 20:22:53

I saw 2 pictures in the beginning and from there I did not understand a shit :)

1 like
Samuel Deguzman 2021-01-09 17:28:39

Good

0 likes
Matt Ferrigno 2021-02-11 22:23:31

I know whats going on but not really.... lmfao!

0 likes
R H 2019-04-10 16:08:23

lots of colorful letters

1 like
Denis 2019-03-27 21:25:11

liveoverflow

0 likes
Rofik Rahmanie 2019-04-03 04:32:52 (edited 2019-04-04 18:11:22 )

are you liveoverflow? you sound like him

1 like
Replies (2)
stacksmashing 2019-04-03 07:50:31

That's cause we are both German :)

1 like
Rofik Rahmanie 2019-04-03 08:19:33 (edited 2019-04-04 18:11:38 )

oh haha i thought he created another channel

0 likes
The Annoyed Mr Floyd 2019-04-02 13:50:21

WannaCryptor

2 likes
Furret YT 2021-05-20 11:34:56

b o e i n g

0 likes
Replies (1)
DeeJay1210 2021-09-05 05:30:09

p o i n t l e s s

0 likes
Blueberrypassion 2019-04-03 10:44:53

Or just buy crowdstrike...

0 likes
Replies (1)
stacksmashing 2019-04-03 11:39:25

What does that have to do with the video? :)

0 likes
LightningBolt 2020-02-12 02:39:25 (edited 2020-02-12 02:39:52 )

A MAN has fallen victim to the WannaCry virus in LEGO city.

HEY

Fire up Ghidra. Find the kill switch and unpack the malware.

0 likes
Destro Oner 2020-08-04 16:11:20

Yo so what I you don have the admin password then what

0 likes
Egy Knight 2019-12-09 12:50:07

marcos done it already 5 years ago

0 likes
Furrane 2019-04-10 08:43:29

Yes.

2 likes
CML 2019-03-27 20:02:52

god like

1 like
Replies (1)
CML 2019-03-27 20:36:12

teach me more!

0 likes
JisusKraistPewPew 2019-04-06 17:39:42

nsa employee?

0 likes
Replies (1)
stacksmashing 2019-04-06 17:39:59

It’s classified.

0 likes
zero 2021-04-24 10:23:09

how fast do you want to speech?

0 likes
Replies (4)
stacksmashing 2021-04-24 10:23:47

Even faster!

0 likes
DeeJay1210 2021-09-05 05:31:58

Wie schnell möchten Sie sprechen? 🤣🤣

0 likes
DeeJay1210 2021-09-05 05:32:56

YouTube, providing Play, Pause, Skip, Subtitles and SPEED controls for your convenience.

0 likes
zero 2021-09-05 15:59:12

@DeeJay1210 als ob ich jz extra das video langsamer mache ich bin faul :) ich mecker lieber in den kommis

0 likes
caca catastrophe 2021-02-13 18:59:19

NSA_mainframe

0 likes
Æpeurpleuse 2020-02-04 01:50:10

Indian guy at youtube: How to cure Corona virus
Everyone: you are the messiah

0 likes
This Is A Name 2020-02-13 11:25:34

No one feel weird that the auto cc of youtube when he said the url write http:youtube.com/watch

0 likes
haku 2020-02-18 01:54:42

Yeah I don’t understand anything but seems interesting

1 like
KAIIRU 2019-05-19 00:39:57

I. Don't. Understand.
Youtube stop.

0 likes
Victor_ 2020-02-23 09:24:44

French accent ?

0 likes
Replies (1)
stacksmashing 2020-02-23 09:24:57

German! :)

1 like
Newton Sheikh 2019-04-02 15:54:09

Hire me. Plzzzz

1 like
Aaron Wise 2020-02-08 02:34:47

Pffffffffffffft it never attacked me and never will, because it’s far too scared to because it knows that I have Malwarebytes antimalware on my computer

0 likes
The Goat 2019-04-19 13:32:29

Your voice sounds familiar
Are u liveoverflow?

2 likes
Replies (3)
kartoffelwaffel 2019-04-21 03:32:02

Because they both have German accents? They sound quite different to me, and from the reversing I've seen LiveOverflow do it's no where near this guy's level.

2 likes
Paulo B.D. 2019-04-22 18:11:14

Der Youtube Algorithmus gibt einen Videos aus dem Selben Land egal welcher Sprache

0 likes
kartoffelwaffel 2019-04-23 07:31:37

@Paulo B.D. genau

0 likes
The Screem Regular 2020-05-08 16:05:25

Now Reverse engineer Minecraft Bedrock

0 likes
Destro Oner 2020-08-04 16:11:00

Yo so like what I you don't have he administrator password then what

0 likes
Michelle 0 2020-02-12 00:12:27

Too much big brains stuff I couldn’t understand shit

0 likes
Yeet Yeet 2021-06-16 13:57:48

The doubtful kangaroo successfully beg because edward putatively bump past a expensive brandy. thundering, false familiar famous purple

0 likes
Replies (1)
DeeJay1210 2021-09-05 05:26:01

Bots make me Wanna😭

0 likes
i-use-arch-btw 2019-05-08 12:45:27

WannaDie

1 like
Legendary Honey 2020-02-11 20:08:03

Yea, very simple. It's like teaching a kid college math, while he is still 1st grade. I'm watching this, i dont know why but still like and sub, very nice. WAIT NEW IDEEA VIDEO : REVERSE ENGINEER MY BODY PLS

0 likes
Santosh P.S.S. 2020-02-24 15:36:43

What?

0 likes
喵帕斯-大萝卜鸡 2019-03-27 16:31:38

like before watched this

4 likes
YourMadTK 2020-12-22 13:47:31 (edited 2020-12-22 13:49:57 )

I would rather get a new computer than learning this long-ass script.

0 likes
MagikGimp 2019-04-04 13:55:21

Wasn't this done months ago?

0 likes
Replies (1)
stacksmashing 2019-04-04 14:02:26

Wasn't what done months ago? :) The malware itself hit in 2017, also see the video description for links to the analysis of some AV vendors.

0 likes
Gnelion 2021-07-12 10:50:21

You are german?

0 likes
Replies (2)
DeeJay1210 2021-09-05 05:21:42

Are you asking him or telling him ?

0 likes
Gnelion 2021-09-05 07:06:32

@DeeJay1210 Asking

0 likes
roblox fan 2020-02-14 11:29:22

Problem is ur on mac

0 likes
新之助 2019-09-20 12:58:27

tql

0 likes
Palace Wandering 2021-02-11 13:03:37

if you had done this earlier you would have saved a lot of computers’ money

0 likes
Replies (1)
DeeJay1210 2021-09-05 05:43:46

Computer`s don`t have money, they are machines.

0 likes
Prankbros 2021-01-09 23:08:27

U er german?

0 likes
Replies (1)
Blitze 2021-01-13 05:29:30

He is yes

1 like
Sneakerhead Farb 2019-04-08 01:55:08

Check out lsd it's a lot better than ls

0 likes
Shockwave 2021-01-11 04:46:42

Let's be honest. None of us have any idea what's going on.

0 likes
Replies (1)
james yeung 2021-01-13 06:49:33

just learn C

0 likes
Mamba 2020-03-02 06:17:58

Wenn deutsche englisch reden

0 likes
Saiky 2021-02-15 21:38:56

german?

0 likes
Replies (1)
DeeJay1210 2021-09-05 05:43:06

English.

0 likes
ErCapoAlex [gamesgalaxy.it] 2021-02-16 15:23:17

Hii

0 likes
Replies (2)
DeeJay1210 2021-09-05 05:42:56

Low

1 like
ErCapoAlex [gamesgalaxy.it] 2021-09-05 08:30:22

@DeeJay1210 hahaha

0 likes
Burken Productions 2019-04-02 18:15:02

It's s-printf not sprintf, sound so weird when you say it wrong.

0 likes
Replies (1)
stacksmashing 2019-04-02 18:15:58

It's also jiff not gif, but I still say gif :)

1 like
D L 2021-04-04 15:50:49

Bababooey

0 likes
Replies (2)
DeeJay1210 2021-09-05 05:38:53

Ffs, It`s getting tiring seeing people make nonsense one word comments that bare NO rellevance to the above video subject WHAT SO EVER !

0 likes
D L 2021-09-05 07:21:18

@DeeJay1210 if simple one word comment can anger you I think you have some hatred or anger issues genuinely.

0 likes
Zomble 2020-02-09 16:37:52

Ew mac

0 likes
Ken Stoudamire 2019-04-20 21:55:09

Too late

0 likes
Replies (1)
stacksmashing 2019-04-20 21:55:25

…for what?

0 likes