SlideShare a Scribd company logo
radare2	
  
@antojosep007	
  
@whoami	
  
Ê  Anto	
  Joseph	
  C	
  J	
  
Ê  Security	
  Engineer	
  @	
  Citrix	
  
Ê  Speaker	
  /	
  Trainer	
  @	
  NullCon	
  ,	
  GroundZero,C0C0n	
  ,	
  X0rConf…	
  
Ê  Primary	
  Interests	
  in	
  Android	
  /	
  IOS	
  ,	
  IOT	
  	
  and	
  a	
  little	
  bit	
  of	
  
everything	
  
Ê  Twitter	
  :	
  @antojosep007	
  
Radare2 - An Introduction by Anto Joseph
Ê  radare	
  is	
  a	
  reverse	
  engineering	
  framework	
  	
  
Ê  Lots	
  of	
  cli	
  tools	
  to	
  work	
  with	
  binary	
  files	
  and	
  understand	
  the	
  
way	
  they	
  work.	
  	
  
Ê  supports	
  analyzing	
  binaries,	
  disassembling	
  code,	
  debugging	
  
programs,	
  attaching	
  to	
  remote	
  gdb	
  servers	
  and	
  so	
  on.	
  
	
  
	
  
	
  
	
  
	
   	
   	
   	
  source	
  (http://radare.org/r/)	
  
radare2	
  
Use	
  Cases	
  
Ê  Disassemble	
  (and	
  assemble	
  for)	
  many	
  different	
  architectures	
  
Ê  Debug	
  with	
  local	
  native	
  and	
  remote	
  debuggers	
  (gdb,	
  rap,	
  webui,	
  r2pipe,	
  winedbg,	
  windbg)	
  
Ê  Perform	
  forensics	
  on	
  file	
  systems	
  and	
  data	
  carving	
  
Ê  Be	
  scripted	
  in	
  Python,	
  Javascript,	
  Go	
  and	
  more	
  
Ê  Support	
  collaborative	
  analysis	
  using	
  the	
  embedded	
  webserver	
  
Ê  Visualize	
  data	
  structures	
  of	
  several	
  file	
  types	
  
Ê  Patch	
  programs	
  to	
  uncover	
  new	
  features	
  or	
  fix	
  vulnerabilities	
  
Ê  Use	
  powerful	
  analysis	
  capabilities	
  to	
  speed	
  up	
  reversing	
  
Ê  Aid	
  in	
  software	
  exploitation	
  
	
   	
   	
   	
   	
  (	
  source	
  :	
  http://radare.org/r/	
  )	
  
Support	
  
Ê  radare2	
  supports:	
  
Ê  Architectures	
  6502,	
  8051,	
  arm,	
  arc,	
  avr,	
  bf,	
  tms320	
  (c54x,	
  c55x,	
  c55+),	
  gameboy	
  
csr,	
  dcpu16,	
  dalvik,	
  i8080,	
  mips,	
  m68k,	
  mips,	
  msil,	
  snes,	
  nios	
  II,	
  sh,	
  sparc,	
  rar,	
  
powerpc,	
  i386,	
  x86-­‐64,	
  H8/300,	
  malbolge,	
  T8200,	
  LH5801	
  
Ê  File	
  formats	
  bios,	
  dex,	
  elf,	
  elf64,	
  filesystem,	
  java,	
  fatmach0,	
  mach0,	
  mach0-­‐64,	
  
MZ,	
  PE,	
  PE+,	
  TE,	
  COFF,	
  plan9,	
  bios,	
  dyldcache,	
  Gameboy	
  and	
  Nintendo	
  DS	
  
ROMs	
  
Ê  Operating	
  systems	
  Android,	
  GNU/Linux,	
  [Net|Free|Open]BSD,	
  iOS,	
  OSX,	
  QNX,	
  
w32,	
  w64,	
  Solaris,	
  Haiku,	
  FirefoxOS	
  
Ê  Bindings	
  Vala/Genie,	
  Python	
  (2,	
  3),	
  NodeJS,	
  LUA,	
  Go,	
  Perl,	
  Guile,	
  php5,	
  newlisp,	
  
Ruby,	
  Java,	
  OCAML	
  and	
  more	
  
Installation	
  
Ê  $	
  git	
  clone	
  https://github.com/radare/radare2.git	
  
Ê  $	
  cd	
  radare2	
  
Ê  $	
  sudo	
  sys/install.sh	
  
Basic	
  Usage	
  :	
  rabin2	
  –	
  I	
  ELF_NAME	
  
SECTIONS	
  :	
  Rabin2	
  –S	
  ELF_NAME	
  
Basic	
  Analysis	
  
Ê  “?	
  “	
  is	
  your	
  friend	
  ,	
  useful	
  for	
  understanding	
  commands	
  
Ê  Radare2	
  ELF_NAME	
  
Ê  AAA	
  :	
  	
  Full	
  Analysis	
  
Ê  V	
  :	
  Enter	
  Graphical	
  Mode	
  
Ê  n	
  :	
  Seek	
  b/w	
  Sections	
  
Ê  Get	
  to	
  Main	
  and	
  Use	
  V	
  again	
  to	
  see	
  the	
  data	
  flow	
  
Basic	
  Commands	
  
Ê  pdf	
  @	
  main	
  :	
  prints	
  the	
  dis-­‐assembled	
  function,	
  which	
  is	
  the	
  
main	
  function	
  in	
  this	
  case	
  
Ê  x	
  10	
  :	
  	
  prints	
  the	
  first	
  10	
  bytes	
  of	
  memory	
  from	
  the	
  current	
  
offset	
  
Ê  s	
  (	
  0x0ffset)	
  :	
  	
  seeks	
  to	
  the	
  specified	
  offset	
  
Ê  ?	
  0x34	
  ^	
  0x34	
  :	
  does	
  xor	
  within	
  radare2	
  and	
  prints	
  output	
  in	
  
different	
  formats	
  
Ê  117	
  ^	
  0x34	
  :	
  does	
  base	
  conversion	
  and	
  then	
  does	
  xor	
  
Demo	
  Time	
  :	
  3	
  little	
  crackme	
  
Ê  First	
  2	
  crackme’s	
  from	
  ripsec	
  (	
  
http://security.cs.rpi.edu/courses/binexp-­‐spring2015/	
  )	
  
Ê  3rd	
  challenge	
  :	
  EasyELF	
  from	
  (
http://reversing.kr/download.php?n=11)	
  
Ê  Start	
  from	
  strings	
  or	
  Main	
  Function	
  
Ê  Analyze	
  where	
  the	
  input	
  goes	
  to	
  
Ê  Locate	
  the	
  FLAG	
  in	
  memory	
  
Ê  	
  Identify	
  the	
  Logic	
  
Ê  Enter	
  your	
  FLAG	
  J	
  
DEMO TIME
Thanks	
  !	
  
Ê  References	
  :	
  
Ê  Radare2	
  Book	
  
Ê  Radare2	
  Website	
  has	
  	
  some	
  documentation	
  and	
  Videos	
  linked	
  

More Related Content

PPT
Intrusion Detection System
PPTX
Dos attack
PPTX
Denial of service attack
PDF
Malware detection-using-machine-learning
PDF
Radare2 @ ndh2k15 : First r2babies steps
PPTX
Malware Classification and Analysis
PPTX
IDS, IPS, IDPS
PPT
intrusion detection system (IDS)
Intrusion Detection System
Dos attack
Denial of service attack
Malware detection-using-machine-learning
Radare2 @ ndh2k15 : First r2babies steps
Malware Classification and Analysis
IDS, IPS, IDPS
intrusion detection system (IDS)

What's hot (20)

PPTX
Intrusion detection and prevention system
PPT
Malicious software
PPTX
Intrusion Prevention System
PDF
Domain specific Software Architecture
PPT
Android application structure
PPTX
Android studio ppt
PPTX
Intrusion prevention system(ips)
PPTX
kali linux Presentaion
PPTX
Denial of Service Attacks (DoS/DDoS)
PPT
Distributed System-Multicast & Indirect communication
PDF
Classes and Objects
PPT
IDS and IPS
PDF
Cyber Security - Unit - 1 - Systems Vulnerability Scanning Overview of Vulner...
PPTX
Network forensic
PPTX
C# Private assembly
PPTX
Trojan virus & backdoors
PPT
Networking and penetration testing
PPTX
Computer virus
PPTX
Configuring Data Sources in AlienVault
PDF
Nmap basics
Intrusion detection and prevention system
Malicious software
Intrusion Prevention System
Domain specific Software Architecture
Android application structure
Android studio ppt
Intrusion prevention system(ips)
kali linux Presentaion
Denial of Service Attacks (DoS/DDoS)
Distributed System-Multicast & Indirect communication
Classes and Objects
IDS and IPS
Cyber Security - Unit - 1 - Systems Vulnerability Scanning Overview of Vulner...
Network forensic
C# Private assembly
Trojan virus & backdoors
Networking and penetration testing
Computer virus
Configuring Data Sources in AlienVault
Nmap basics
Ad

Viewers also liked (18)

PPTX
IOS Security Basics - NULL/ OWASP/G4H Meet
PPTX
Threat intelligence - nullmeetblr 21st June 2015
PPTX
Panel discussion social engineering - manasdeep - nullmeetblr 21st June 2015
PPTX
Netcat - A Swiss Army Tool
PDF
Owasp m7-m8-shivang nullmeetblr 21june2015
PPTX
Dark Arts Of Social Engineering
PPTX
Venom vulnerability Overview and a basic demo
PDF
Null bufferoverflow
PDF
ODP
What is a VLAN and DMZ
PPTX
Metasploit For Beginners
PPTX
Saml sso by Tamil on nullblrmeet 21st July 2015
PDF
SIEM Architecture
PDF
Exploiting publically exposed Version Control System
PDF
Slides null puliya linux basics
PDF
SSL Pinning and Bypasses: Android and iOS
IOS Security Basics - NULL/ OWASP/G4H Meet
Threat intelligence - nullmeetblr 21st June 2015
Panel discussion social engineering - manasdeep - nullmeetblr 21st June 2015
Netcat - A Swiss Army Tool
Owasp m7-m8-shivang nullmeetblr 21june2015
Dark Arts Of Social Engineering
Venom vulnerability Overview and a basic demo
Null bufferoverflow
What is a VLAN and DMZ
Metasploit For Beginners
Saml sso by Tamil on nullblrmeet 21st July 2015
SIEM Architecture
Exploiting publically exposed Version Control System
Slides null puliya linux basics
SSL Pinning and Bypasses: Android and iOS
Ad

Similar to Radare2 - An Introduction by Anto Joseph (20)

PDF
iSec-117Radare2-001010239a9091asd710.pdf
PDF
Sergi Álvarez + Roi Martín - radare2: From forensics to bindiffing [RootedCON...
PDF
Sergi Álvarez & Roi Martín - Radare2 Preview [RootedCON 2010]
PDF
ESIL - Universal IL (Intermediate Language) for Radare2
PDF
Demystifying Binary Reverse Engineering - Pixels Camp
PPTX
embedded C.pptx
PDF
Unit 4 Reverse Engineering Tools Functionalities & Use-Cases.pdf
PDF
Musclenerd - Evolution of iPhone Baseband and Unlocks
PPTX
Reverse Engineering.pptx
PDF
OSS Tools: Creating a Reverse Engineering Plug-in for r2frida
PDF
LCU14 201- Binary Analysis Tools
PDF
Half-automatic Compilable Source Code Recovery
PPTX
Reverse Engineering 101
PDF
iOS recon with Radare2
PDF
Csw2016 wheeler barksdale-gruskovnjak-execute_mypacket
PDF
Filip palian mateuszkocielski. simplest ownage human observed… routers
PDF
Simplest-Ownage-Human-Observed… - Routers
ODP
Graphical libraries
PDF
Possibility of arbitrary code execution by Step-Oriented Programming
PDF
Possibility of arbitrary code execution by Step-Oriented Programming by Hiroa...
iSec-117Radare2-001010239a9091asd710.pdf
Sergi Álvarez + Roi Martín - radare2: From forensics to bindiffing [RootedCON...
Sergi Álvarez & Roi Martín - Radare2 Preview [RootedCON 2010]
ESIL - Universal IL (Intermediate Language) for Radare2
Demystifying Binary Reverse Engineering - Pixels Camp
embedded C.pptx
Unit 4 Reverse Engineering Tools Functionalities & Use-Cases.pdf
Musclenerd - Evolution of iPhone Baseband and Unlocks
Reverse Engineering.pptx
OSS Tools: Creating a Reverse Engineering Plug-in for r2frida
LCU14 201- Binary Analysis Tools
Half-automatic Compilable Source Code Recovery
Reverse Engineering 101
iOS recon with Radare2
Csw2016 wheeler barksdale-gruskovnjak-execute_mypacket
Filip palian mateuszkocielski. simplest ownage human observed… routers
Simplest-Ownage-Human-Observed… - Routers
Graphical libraries
Possibility of arbitrary code execution by Step-Oriented Programming
Possibility of arbitrary code execution by Step-Oriented Programming by Hiroa...

Recently uploaded (20)

PDF
CCleaner Pro 6.38.11537 Crack Final Latest Version 2025
PDF
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Complete Guide to Website Development in Malaysia for SMEs
PPTX
Oracle Fusion HCM Cloud Demo for Beginners
PPTX
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
PPTX
history of c programming in notes for students .pptx
PPTX
Patient Appointment Booking in Odoo with online payment
PPTX
Monitoring Stack: Grafana, Loki & Promtail
PDF
CapCut Video Editor 6.8.1 Crack for PC Latest Download (Fully Activated) 2025
PDF
Autodesk AutoCAD Crack Free Download 2025
PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
DOCX
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Digital Systems & Binary Numbers (comprehensive )
PDF
Salesforce Agentforce AI Implementation.pdf
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
CCleaner Pro 6.38.11537 Crack Final Latest Version 2025
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Operating system designcfffgfgggggggvggggggggg
Complete Guide to Website Development in Malaysia for SMEs
Oracle Fusion HCM Cloud Demo for Beginners
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
history of c programming in notes for students .pptx
Patient Appointment Booking in Odoo with online payment
Monitoring Stack: Grafana, Loki & Promtail
CapCut Video Editor 6.8.1 Crack for PC Latest Download (Fully Activated) 2025
Autodesk AutoCAD Crack Free Download 2025
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Design an Analysis of Algorithms I-SECS-1021-03
Digital Systems & Binary Numbers (comprehensive )
Salesforce Agentforce AI Implementation.pdf
Wondershare Filmora 15 Crack With Activation Key [2025

Radare2 - An Introduction by Anto Joseph

  • 2. @whoami   Ê  Anto  Joseph  C  J   Ê  Security  Engineer  @  Citrix   Ê  Speaker  /  Trainer  @  NullCon  ,  GroundZero,C0C0n  ,  X0rConf…   Ê  Primary  Interests  in  Android  /  IOS  ,  IOT    and  a  little  bit  of   everything   Ê  Twitter  :  @antojosep007  
  • 4. Ê  radare  is  a  reverse  engineering  framework     Ê  Lots  of  cli  tools  to  work  with  binary  files  and  understand  the   way  they  work.     Ê  supports  analyzing  binaries,  disassembling  code,  debugging   programs,  attaching  to  remote  gdb  servers  and  so  on.                  source  (http://radare.org/r/)   radare2  
  • 5. Use  Cases   Ê  Disassemble  (and  assemble  for)  many  different  architectures   Ê  Debug  with  local  native  and  remote  debuggers  (gdb,  rap,  webui,  r2pipe,  winedbg,  windbg)   Ê  Perform  forensics  on  file  systems  and  data  carving   Ê  Be  scripted  in  Python,  Javascript,  Go  and  more   Ê  Support  collaborative  analysis  using  the  embedded  webserver   Ê  Visualize  data  structures  of  several  file  types   Ê  Patch  programs  to  uncover  new  features  or  fix  vulnerabilities   Ê  Use  powerful  analysis  capabilities  to  speed  up  reversing   Ê  Aid  in  software  exploitation            (  source  :  http://radare.org/r/  )  
  • 6. Support   Ê  radare2  supports:   Ê  Architectures  6502,  8051,  arm,  arc,  avr,  bf,  tms320  (c54x,  c55x,  c55+),  gameboy   csr,  dcpu16,  dalvik,  i8080,  mips,  m68k,  mips,  msil,  snes,  nios  II,  sh,  sparc,  rar,   powerpc,  i386,  x86-­‐64,  H8/300,  malbolge,  T8200,  LH5801   Ê  File  formats  bios,  dex,  elf,  elf64,  filesystem,  java,  fatmach0,  mach0,  mach0-­‐64,   MZ,  PE,  PE+,  TE,  COFF,  plan9,  bios,  dyldcache,  Gameboy  and  Nintendo  DS   ROMs   Ê  Operating  systems  Android,  GNU/Linux,  [Net|Free|Open]BSD,  iOS,  OSX,  QNX,   w32,  w64,  Solaris,  Haiku,  FirefoxOS   Ê  Bindings  Vala/Genie,  Python  (2,  3),  NodeJS,  LUA,  Go,  Perl,  Guile,  php5,  newlisp,   Ruby,  Java,  OCAML  and  more  
  • 7. Installation   Ê  $  git  clone  https://github.com/radare/radare2.git   Ê  $  cd  radare2   Ê  $  sudo  sys/install.sh  
  • 8. Basic  Usage  :  rabin2  –  I  ELF_NAME  
  • 9. SECTIONS  :  Rabin2  –S  ELF_NAME  
  • 10. Basic  Analysis   Ê  “?  “  is  your  friend  ,  useful  for  understanding  commands   Ê  Radare2  ELF_NAME   Ê  AAA  :    Full  Analysis   Ê  V  :  Enter  Graphical  Mode   Ê  n  :  Seek  b/w  Sections   Ê  Get  to  Main  and  Use  V  again  to  see  the  data  flow  
  • 11. Basic  Commands   Ê  pdf  @  main  :  prints  the  dis-­‐assembled  function,  which  is  the   main  function  in  this  case   Ê  x  10  :    prints  the  first  10  bytes  of  memory  from  the  current   offset   Ê  s  (  0x0ffset)  :    seeks  to  the  specified  offset   Ê  ?  0x34  ^  0x34  :  does  xor  within  radare2  and  prints  output  in   different  formats   Ê  117  ^  0x34  :  does  base  conversion  and  then  does  xor  
  • 12. Demo  Time  :  3  little  crackme   Ê  First  2  crackme’s  from  ripsec  (   http://security.cs.rpi.edu/courses/binexp-­‐spring2015/  )   Ê  3rd  challenge  :  EasyELF  from  ( http://reversing.kr/download.php?n=11)   Ê  Start  from  strings  or  Main  Function   Ê  Analyze  where  the  input  goes  to   Ê  Locate  the  FLAG  in  memory   Ê   Identify  the  Logic   Ê  Enter  your  FLAG  J  
  • 14. Thanks  !   Ê  References  :   Ê  Radare2  Book   Ê  Radare2  Website  has    some  documentation  and  Videos  linked