IoT Worlds
radare 2

What is Radare 2?

Reverse engineering is the practice of studying software without understanding its source code, to gain an understanding of how it functions and how best to modify or repair it. Reverse engineering techniques can be employed for analysis such as malware analysis, patching or finding exploits in programs.

Radare 2 is a free and open-source framework designed for digital forensics, software reverse engineering, debugging and comparing binary files across platforms and architectures. It comes equipped with several command line utilities such as file metadata extraction, base conversion and unified binary diffing that make its usage easy and straightforward.

What is Radare 2?

Radare 2, or r2 for short, is a free and open-source framework which offers various tools for disassembling, debugging and analyzing binary files. It supports various file formats and architectures including native apps, firmware apps and Android apps as well as creating custom patches or modifications of existing software as well as reverse engineering security vulnerabilities.

The R2 Framework consists of several small command-line utilities that can be used independently or together, the most notable of which being Rabin2 which serves as its core functionality for analyzing binaries with its powerful hexadecimal editor and debugger, supporting various processor architectures. Furthermore, other tools like RaHash2, RaFind2, Ragg2 and rarun2 exist as part of this framework to perform specific functions.

Each of these tools offers different features that can be put to different uses. Hexdiff can compare two hexadecimal representations of a string to identify any differences; rafind helps users locate symbols, functions and macros within an executable file; rahash2 can create hashes of data within executables while rafind2 helps detect patterns within data; while rasm2 serves as both an assembler and disassembler of computer software supporting multiple processor architectures;

As with any tool, radare 2 requires careful understanding in order to be utilized effectively. As there are various commands and options to navigate through, beginners are advised to take small steps at first before checking their work as they go along. When necessary, additional assistance or resources should be sought out as soon as possible.

Once you are familiar with the r2 command-line interface, it is easy to start analyzing binaries. Simply run r2 with an executable as its path and any necessary arguments; its shell will display results of your command. Although at first the shell prompt can seem intimidating, take the time to learn each letter’s meaning – most commands consist of simple chains of letters which should soon become second nature.

Discover how to learn reverse engineering with Radare 2, click here.

How to use Radare 2

Radare 2 is an array of tools for reverse engineering and analysis of binary files. It consists of disassembler, debugger, patcher, as well as many other useful features to facilitate reverse engineering of apps on Android and iOS platforms, architectures, file formats as well as exploit development features such as ROP gadget search engine search capability and mitigation detection.

To use radare2, simply run it with the path to your binary and any optional arguments. A quick way is simply typing “r2 path>”. This will open your binary up in its primary UI of the program.

From here, you can explore the functions of the program using commands like px (print hexadecimal memory dumps), sr (print strings) and w (write to memory). Furthermore, you can pause execution with dc or ds or set breakpoints with dp.

Another powerful command is i, which displays the entry points of any program. These are the lines in its binary code where it will access when performing certain functions – something which is especially helpful when trying to crack passwords.

One of the key things to keep in mind when working with tools such as this is setting out with a clear goal in mind. Without one, it can be easy to become sidetracked in all the details of using them; having a goal in place makes staying on track much simpler.

An effective approach for using radare2 is to gain a comprehensive knowledge of its commands through exploration of its help system. Each command has different subcommands that may be utilized; therefore, taking time to explore them all will enable you to fully appreciate what each one can offer.

This quickstart guide has only scratched the surface of what r2 can do, but should give you an understanding of its capabilities. In our next article we will use it to address more complex challenges posted by RPISEC.

Advanced features of Radare 2

Radare 2 is an impressive framework designed to assist with disassembly, debugging, patching, data comparison and analysis of binaries. Compatible with Windows, Linux and many other architectures it features an easy command-line interface and scripting capability, supporting various file formats with its main philosophy being free and open-source software development.

R2 is distinguished from other disassemblers by providing several tools to aid you in the analysis of binary files. Its built-in debugger enables you to step through an executable while recording changes to machine state, including registers and memory usage. This feature makes r2 particularly helpful when it comes to binary code analysis because it allows you to see how each command influences program output.

It comes equipped with several utilities, such as rax2, which allows for base conversion from hex to decimal or octal, and ag, which visualizes control flow graphs for executable files. These tools can prove very helpful for reverse engineering and hacking activities.

R2 is an exceptionally flexible framework, offering virtually limitless commands. Users should be cognizant of both its strengths and limitations; reading documentation or posting questions on IRC are excellent ways of becoming familiar with its workings. Another useful way of getting to know r2 is the “a” command, which displays a list of commands to explore further and learn about this tool.

Radare2 stands out by disassembling and debugging executable files – particularly useful when debugging mobile apps that can often be difficult to track down. Furthermore, this tool provides excellent analysis for complex apps, helping find bugs quickly.

At present, r2 supports several major file formats, including odex and multidex files, ARM ELFs and Android APKs. Furthermore, JNI and Java classes are supported. However, other file types, including dynload and symlinks are still lacking support.

The next big development for r2 is adding the SLEIGH disassembly backend to radare2. This will expand its support of architectures beyond Ghidra while improving interface, analysis and flexibility of this tool.


Radare2 is an open source framework for reverse engineering and binary analysis. Comprised of various command-line utilities that can be used together or independently, Radare2 allows you to perform various tasks including disassembling, patching, analyzing and visualizing binaries as well as supporting numerous architectures and file formats.

Digital forensics or software exploitation often employ this tool, for analyzing malware or finding vulnerabilities in existing applications, writing exploits for various platforms and architectures (for instance creating shellcode for Linux kernel exploits or Windows executables), debugger creation or system memory examination.

Use of radare2 can be both challenging and rewarding. Proper usage includes understanding its capabilities and limitations as well as using various tools for reverse engineering purposes and seeking assistance and resources when needed.

Radare2’s most advanced feature is its ability to disassemble and analyze code. This feature is extremely effective at breaking apart executable files into their constituent parts so as to better understand how they operate, providing valuable insight into how executables function. To take advantage of it, simply run the r2 command with a path pointing directly at your binary executable file.

R2 is an invaluable command-line tool, with several uses including base conversion, file information extraction and unification binary diffing. Furthermore, it can disassemble binary code for viewing source code or disassembling and viewing binaries directly. Since r2 is an unfamiliar command-line interface it’s best to familiarise yourself with its commands before trying them out for yourself.

Radare2 is an indispensable reverse engineering tool, even with all its complexity. It makes an excellent alternative for people already familiar with tools like IDA Pro or Hopper; plus it comes free and offers additional features that make it even more beneficial!

Discover how to learn reverse engineering with Radare 2, click here.

Related Articles

WP Radio
WP Radio