PicoCTF Walkthru [103] - More Cookies
21:40
PicoCTF Walkthru [102] - Easy1
9:44
2 жыл бұрын
PicoCTF Walkthru [100] - The Numbers
3:58
PicoCTF Walkthru [99] - Big Zip
5:10
PicoCTF Walkthru [98] - First Find
6:57
PicoCTF Walkthru [96] - New Caesar
25:15
Пікірлер
@youssimoon
@youssimoon Күн бұрын
thank u man 🙏🙏🙏🙏
@SowmyaMaddukuri
@SowmyaMaddukuri Ай бұрын
but why we entered robots.txt after the URL how do you know that ??
@sfwani
@sfwani 2 ай бұрын
love how you explain all the different ways of approaching any problem and also talk about the takeaways; thank you so much!
@mike_on_tech
@mike_on_tech 2 ай бұрын
I'm glad you liked the different approaches!
@adamcollins9622
@adamcollins9622 2 ай бұрын
hey was just wondering what was it you clicked in too to open the ssh
@idsoftware7
@idsoftware7 2 ай бұрын
good one mike...
@mphatsomisinde418
@mphatsomisinde418 2 ай бұрын
Thanks mahn.😢
@NguyễnLong-o1t
@NguyễnLong-o1t 4 ай бұрын
thank you very much
@euler7586
@euler7586 4 ай бұрын
Great explanation, sir!
@TerricTriglycerides
@TerricTriglycerides 5 ай бұрын
How do you get so good at this stuff? Also, you're super helpful, it helps a lot. Thank you!
@AsheraLoux
@AsheraLoux 5 ай бұрын
how do you get the terminal to color code commands?
@raihanrashid1378
@raihanrashid1378 6 ай бұрын
The 128 times loop ig wasn't necessary you could have just shifted 1 bit 8 times and flipped that bit. So, 8 would be the inner loop count.
@morticiaaddams5013
@morticiaaddams5013 6 ай бұрын
Bende ....Hiding-from-you yazıyor bunu nasıl çözebilirim
@carolinepeace819
@carolinepeace819 6 ай бұрын
my payload attack won't work, my "request count" is 0 and i have no clue how to change it
@carolinepeace819
@carolinepeace819 6 ай бұрын
and i followed step-by-step this video.. so if you have an idea i need it
@stefel7765
@stefel7765 6 ай бұрын
only video/writeup that helped me understand this one, thanks a lot!
@mike_on_tech
@mike_on_tech 5 ай бұрын
Glad it helped!
@cs06dhatchinamoorthy53
@cs06dhatchinamoorthy53 6 ай бұрын
Thanks ;⁠)
@mike_on_tech
@mike_on_tech 5 ай бұрын
No problem
@draconightwalker4964
@draconightwalker4964 7 ай бұрын
thanks for this
@mike_on_tech
@mike_on_tech 7 ай бұрын
You're welcome
@SaaimSherif
@SaaimSherif 7 ай бұрын
This is excellent explanation. Kudos. Just one correction. @12:48, the ord() value of the second letter "i" is not changed to binary. Instead the binary value "0111000000000000" is converted back to decimal, which is "28672". Then they both are added and we get 28777. We then view it in hex, which is 7069^16 and the corresponding Japanese symbol. For anyone like me who's confused on the part where he adds both the binary values, here's the explanation. Thanks!
@mike_on_tech
@mike_on_tech 7 ай бұрын
Appreciate the correction.
@naif5350
@naif5350 8 ай бұрын
Man you’re really making things easier for me Thank you! I know I’m a little late but I can’t help but thank you for what you’re doing It’s truly amazing
@mike_on_tech
@mike_on_tech 7 ай бұрын
Happy to help!
@rdt777
@rdt777 8 ай бұрын
why using static ?
@weijietan1178
@weijietan1178 8 ай бұрын
thanks for giving such a detailed explanation
@mike_on_tech
@mike_on_tech 8 ай бұрын
Glad it was helpful!
@yaserbit
@yaserbit 8 ай бұрын
Great content man, I appreciate these videos
@mike_on_tech
@mike_on_tech 8 ай бұрын
I appreciate that!
@_RevansiddappaDiggavi
@_RevansiddappaDiggavi 8 ай бұрын
how did you come to know that its robots,=.txt file
@mike_on_tech
@mike_on_tech 8 ай бұрын
This is one of those things that you learn once, then know to look for. Its a file that web crawlers read.
@trashdoc6920
@trashdoc6920 5 ай бұрын
@@mike_on_tech but how did you know it was called Robots? Sorry this one is confusing to me
@trashdoc6920
@trashdoc6920 5 ай бұрын
Never mind I see that its going to be called "robots.txt" in most cases lol. Thank you for the video!
@nicolaspanu7448
@nicolaspanu7448 8 ай бұрын
Great content, many thanks!
@mike_on_tech
@mike_on_tech 8 ай бұрын
My pleasure!
@yaserbit
@yaserbit 8 ай бұрын
I really appreciate these videos man, they're really helpful
@mike_on_tech
@mike_on_tech 8 ай бұрын
Glad to hear it!
@LeanBeefPattygoneDark
@LeanBeefPattygoneDark 9 ай бұрын
Thank you ! I was stuck in this for a long time !! Love your in-depth explanation ❤
@mike_on_tech
@mike_on_tech 8 ай бұрын
Awesome, glad to help!
@weijietan1178
@weijietan1178 9 ай бұрын
very detailed explanation thank you!
@mike_on_tech
@mike_on_tech 9 ай бұрын
Glad you enjoyed it!
@weijietan1178
@weijietan1178 9 ай бұрын
hey sir, thanks for another detailed and well explained walk through, i just started ctf so this challenge was quite challenging and took a toll on me. im always loving your videos keep it up!
@mike_on_tech
@mike_on_tech 9 ай бұрын
Awesome, thanks for letting me know. Always makes my day to see comments like these!
@weijietan1178
@weijietan1178 9 ай бұрын
i have learnt so much again thank to you sir!
@weijietan1178
@weijietan1178 9 ай бұрын
best ctf tutor i love this channel!
@mike_on_tech
@mike_on_tech 9 ай бұрын
Thanks! Comments like these make my day!
@SoBatistaCyber
@SoBatistaCyber 9 ай бұрын
Hello Mike! I really enjoyed your video thank you very much for your content. On how to find what the flags mean, I was able to do that, though it took me ages. In this video: kzbin.info/www/bejne/iYTWc6CAf9CGgpIsi=7Kb7u5WfwnZ1sQap I talk about it. Feel free to take a look and once again great content! Cheers 😉
@pariskulkarni8113
@pariskulkarni8113 10 ай бұрын
thx
@gokhantunay
@gokhantunay 10 ай бұрын
asdkasmdolkmasod :D
@marammaloom
@marammaloom 10 ай бұрын
thank you for explaining it thoroughly!
@mike_on_tech
@mike_on_tech 10 ай бұрын
No worries!
@sarpogartis
@sarpogartis 10 ай бұрын
echo 'string_to_be_decoded' | base64 --decode
@loandy6841
@loandy6841 10 ай бұрын
Thx!
@RogueMellow
@RogueMellow 11 ай бұрын
bro im unable to enter the cipher text but i can enter the modulus and e values
@mrspeedy86
@mrspeedy86 11 ай бұрын
so hard but 3000 view lol
@vaibhavsuri2389
@vaibhavsuri2389 11 ай бұрын
udp contains pico is not working
@addisonm.2685
@addisonm.2685 11 ай бұрын
Thanks you, I’ve been working through all of these using your walk throughs and learning about each one
@mike_on_tech
@mike_on_tech 10 ай бұрын
Glad you like them!
@westramey7235
@westramey7235 11 ай бұрын
Man! I owe you a case of beer or a nice dinner for you and your family. Dear lord the TLS dissectors section is so misleading. Who at Wireshark likes to do their work writing in ALL CAPS when it only accepts lowercase? That bugged me for hours and it didn't make any sense. Thank you truly! So much. That was driving me mad and making me feel dump. This helped so much.
@mike_on_tech
@mike_on_tech 11 ай бұрын
Thanks, glad to help. Have a good new year!
@phan5302
@phan5302 Жыл бұрын
Okay, this was a fun one
@68-pratikhanjagikar4
@68-pratikhanjagikar4 Жыл бұрын
U are awesome bro❤
@mike_on_tech
@mike_on_tech 11 ай бұрын
Thanks!
@tpt_transparent5179
@tpt_transparent5179 Жыл бұрын
for some reason my gave me Errors No payload positions defined. anyone out there that could help
@robindiamondhands6416
@robindiamondhands6416 Жыл бұрын
I decided to do some picoCTFs.. I was a bit disappointed by the brute force method.. I was thinking-- it cant possibly be pick and guess.. but sure enough.. I don't know much about python.. so I guess I am happy with this more in depth tutorial. This has been the worst picoCTF I've done so far, but mostly because I had to brute force it
@r4iden_
@r4iden_ 11 ай бұрын
Brute force it with a script 🤦🏿‍♂️
@r4iden_
@r4iden_ 11 ай бұрын
You do know you don't have to do it manually right u can change the python program to give the flag directly
@nhathai416
@nhathai416 Жыл бұрын
how they know it is bitflip?
@duchuy.it97
@duchuy.it97 Жыл бұрын
haha I love the way he explain 😄
@mudisabahahmad6139
@mudisabahahmad6139 Жыл бұрын
by far the worst youtube tutorial i have seen on this. why even help
@db5094
@db5094 Жыл бұрын
Thank you
@mike_on_tech
@mike_on_tech Жыл бұрын
You're welcome
@MidnightWill_
@MidnightWill_ Жыл бұрын
/usr/bin/python: can't find '__main__' module in what does that mean
@nerdgammer3073
@nerdgammer3073 Жыл бұрын
anyone who is trying the above challenge take a note that --unicpher no more exists it is --decrypt ......... just run the python3 "scriptname" to see the help manpage