Getting Started Reversing C++ Objects with Ghidra - Ghidra Reversing Tutorials

In this video series, Ghidra Reversing Tutorials, we’ll take a look at several sample programs that use C objects, compile them from source and then reverse engineer them with Ghidra. Our goals will be to identify when the objects are created, recognize the size/structure of the memory allocation and how it’s used by the object and explore the use of virtual functions and virtual function tables. Recognizing the use of C objects is helpful a variety of reverse engineering activities, to include malware analysis and software exploitation. This will be the first in a series of videos exploring the reverse engineering of object-oriented languages. Source code can be found on my Github: Objects
Back to Top