In this video series, Ghidra Reversing Tutorials, we'll take a look at several sample programs that use C++ objects, compile them from source and then reverse engineer them with Ghidra. Our goals will be to identify when the objects are created, recognize the size/structure of the memory allocation and how it's used by the object and explore the use of virtual functions and virtual function tables. Recognizing the use of C++ objects is helpful a variety of reverse engineering activities, to include malware analysis and software exploitation. This will be the first in a series of videos exploring the reverse engineering of object-oriented languages.
Cybersecurity, reverse engineering, malware analysis and ethical hacking content!
🎓 Courses on Pluralsight 👉🏻 [ Ссылка ]
🌶️ YouTube 👉🏻 Like, Comment & Subscribe!
🙏🏻 Support my work 👉🏻 [ Ссылка ]
🌎 Follow me 👉🏻 [ Ссылка ], [ Ссылка ]
⚙️ Tinker with me on Github 👉🏻 [ Ссылка ]
Part 1 - Reversing Looping Control Structures - Ghidra Reversing Tutorials [ Ссылка ]
Part 2 - Reversing Array Data Structures - Ghidra Reversing Tutorials [ Ссылка ]
Part 3 - Reversing Structures - Ghidra Reversing Tutorials [ Ссылка ]
Part 4 - Understanding Calling Conventions - Ghidra Reversing Tutorials [ Ссылка ]
Part 5 - Getting Started Reversing C++ Objects with Ghidra - Ghidra Reversing Tutorials [ Ссылка ]
Part 6 - Inheritance and Polymorphism in C++ - Ghidra Reversing Tutorials [ Ссылка ]
Source code can be found on my Github: [ Ссылка ]
![](https://i.ytimg.com/vi/ir2B1trR0fE/maxresdefault.jpg)