@@prestocranius7627 no these are old challenges that you can still acco
@darwinserrano4163Ай бұрын
Beep boop bop
@darwinserrano4163Ай бұрын
ta weno
@mfist08552 ай бұрын
Also, did u take a VHS cybersecurity course by any chance?
@cozt70502 ай бұрын
no i didnt what is that?
@mfist08552 ай бұрын
yo bro can you do scavenger hunt?
@cozt70502 ай бұрын
scavengerr hhunt how?
@itsjbgold2 ай бұрын
Clairo is still my favorite music artist.
@yanisfalaki2 ай бұрын
bro if you say "for the most part" one more time im gonna kill myself
@cozt70502 ай бұрын
Lmao
@Hnxzxvr2 ай бұрын
Ty
@krissradev67082 ай бұрын
can i inject bytes (.bin file) or .exe files instead of shellcode? with the techniques in the video?
@cozt70502 ай бұрын
bin file i think its file but exe not sure
@UNKNOWNr0073 ай бұрын
how if in linux?
@cozt70503 ай бұрын
You might need to switch the payload. The payload I use was for windows
@Naruto-dattebayo.3 ай бұрын
thx for the video 😁
@cozt70503 ай бұрын
No problem 😊
@ujjwaldhoundiyal43693 ай бұрын
what software do you use
@cozt70503 ай бұрын
i was on manjaro last time, then for recoridng i used OBS, and the tool to reverse ghidra
@Hdhshsbssjsjsj3 ай бұрын
neat explaination bruh. keep it up
@cozt70503 ай бұрын
thank you
@FHNirob-hu4ny4 ай бұрын
Can I get your telegram id I need your little help
@FHNirob-hu4ny4 ай бұрын
Hello sir I'm a @new_coder in rust language I want your help can you help me sir your pro in rust
@shpleemcgert4 ай бұрын
good tip on sqlmap. Wasn’t aware of that tool. Thanks for sharing broski
@cozt70504 ай бұрын
Glad to help
@martinmeza85514 ай бұрын
really aprecciate your videos dude
@cozt70504 ай бұрын
thank you
@petwillcox39345 ай бұрын
😇 Promo SM
@commandogaming22305 ай бұрын
Yo saw your channel and loved it :)
@cozt70505 ай бұрын
Thank you!
@alfredooviedo94106 ай бұрын
Lesssgoooooo
@ONEGOALONEJOURNEY6 ай бұрын
well your explaination was quite good i under stand it till the file descripter part and then figure it out how to solve it thanks for the help
@alfredooviedo94106 ай бұрын
Lesgoooooo
@alfredooviedo94106 ай бұрын
Good work 🫡
@cozt70506 ай бұрын
Thanks 🔥
@xaiver36126 ай бұрын
Wow brother, i did not know this website. Do you have a community or a parsonal discord for cybersecurity brother wich we can encourage ourselves and share knowlage like a forum. I would be happy to join though.cause I want to learn this.
@cozt70506 ай бұрын
i have a discord but a discord account but not a server i do not have one just yet.
@alfredooviedo94106 ай бұрын
Do you have any resources to go over to prime me for these challenges? Love your content btdubs. keep up the good work :)
@cozt70506 ай бұрын
Resource would probably be port swigger academy
@amaurybecquet17346 ай бұрын
I was just wondering were first you learned all this stuff ? I am currently working on CTFs and have seen most your lordofsqli vidéos but i dont know where you first learned all this ?
@cozt70506 ай бұрын
I first started off with burp suite academy with a bunch of friends then hack the box and after that I started to do ctfs on ctftime and now I’m just solving random ctf sites. It’s pretty fun it all start by just starting to do things
@ohmsohmsohms6 ай бұрын
good shit
@cozt70506 ай бұрын
Thanks 🙏
@echongkan016 ай бұрын
But one is not supposed to be able to see the service side code.
@cozt70506 ай бұрын
You are right but this is a ctf challenges in some web applications you can see the source code while others you can’t at all
@captain-tb2ek7 ай бұрын
Hi sir I would like to know how to get started in wbe hacking,your videos actually inspired me. A reply would be fantastic. Thanks in advance
@cozt70507 ай бұрын
honestly best way to start learning is to self learn through a ctf watch a video series or read a book just start now and you don't need the latest computer you can do web hacking in a cheap computer or laptop just start doing it now
@Stray07 ай бұрын
">=" means "greater or equal"
@cozt70507 ай бұрын
thank you for the catch
@alfredooviedo94107 ай бұрын
What is your setup on your iterm? Good video btdubs
@cozt70507 ай бұрын
regular zsh with a custom neofetch ascii art
@alexsandoval72177 ай бұрын
You got a discord ?
@cozt70507 ай бұрын
Yeah ynnnad is my username
@katiagalkina46077 ай бұрын
ty! I was today years old that found out XOR is actually zor!
@cozt70507 ай бұрын
No problem
@werren8947 ай бұрын
malware development is always ethical tho it is not virus development, every enthusiast would write malware for science about how far program could be, the architecture of virus, language design, etc, it is both ethical and unethical, the benefits of this is for the future for antivirus development, language design also affect the feature of virus. that is why opensource and community exist, to make sure hobbyist are not lonely, because it could be dangerous.
@cozt70507 ай бұрын
This is true
@werren8947 ай бұрын
@@cozt7050 good shit, keep going tho, i would like to see some nvdia/gpu coding and stuff, since AI ceo seems to be quite arrogant.
@alaesenpai54097 ай бұрын
thanks for the explanation, your video is by far the best one that explains this challenge . i just would like to mention something when you want to check the binary protection just use checksec tool rather then write in the python scripte :)
@cozt70507 ай бұрын
Thanks for the tip!
@newman30598 ай бұрын
I really liked your method, thanks for the vid! Do you have any tips or resources for learning binary exploitation/reversing for a beginner?
@cozt70507 ай бұрын
This is a really good intro guyinatuxedo.github.io
@jajuang.videos8 ай бұрын
Great work
@cozt70507 ай бұрын
Thank you so much 😀
@sead99968 ай бұрын
well done, thank you
@cozt70508 ай бұрын
No problem 👍
@N0RT0X8 ай бұрын
Lets go!
@cozt70508 ай бұрын
Thanks
@stephenbonf18 ай бұрын
Great explanation! Thanks!
@cozt70508 ай бұрын
Glad it was helpful!
@EARN-750-DAILY_JOB_FOR_U9 ай бұрын
"The first step toward success is taken when you refuse to be a captive of the environment in which you first find yourself." --Mark Caine
@くも-v7n9 ай бұрын
I was wondering how to bypass traversal measures. ..././ <- What`s this path? (Is this stated somewhere?)
@cozt70509 ай бұрын
if you ever used linux you know .. is to go back so all i was simply doing is going back. in my case i got lucky it was at that location
@m.af.i.a9 ай бұрын
You were on the right path, as per the medium article you could have also chained the base64 decode to print the code on the same page. Just read few lines below. Keep posting. Love this.
@cozt70509 ай бұрын
Ohhhhh. Thanks for the support
@ayoubkouhlani77469 ай бұрын
Hi, This may be a stupid question, but how much time do you spend on this in a week?
@cozt70509 ай бұрын
Depending on how hard the ctf challenge is . I’ll say this the pwn challenges take me a couple days but the web ones are a bit easier