but why we entered robots.txt after the URL how do you know that ??
@sfwani2 ай бұрын
love how you explain all the different ways of approaching any problem and also talk about the takeaways; thank you so much!
@mike_on_tech2 ай бұрын
I'm glad you liked the different approaches!
@adamcollins96222 ай бұрын
hey was just wondering what was it you clicked in too to open the ssh
@idsoftware72 ай бұрын
good one mike...
@mphatsomisinde4182 ай бұрын
Thanks mahn.😢
@NguyễnLong-o1t4 ай бұрын
thank you very much
@euler75864 ай бұрын
Great explanation, sir!
@TerricTriglycerides5 ай бұрын
How do you get so good at this stuff? Also, you're super helpful, it helps a lot. Thank you!
@AsheraLoux5 ай бұрын
how do you get the terminal to color code commands?
@raihanrashid13786 ай бұрын
The 128 times loop ig wasn't necessary you could have just shifted 1 bit 8 times and flipped that bit. So, 8 would be the inner loop count.
@morticiaaddams50136 ай бұрын
Bende ....Hiding-from-you yazıyor bunu nasıl çözebilirim
@carolinepeace8196 ай бұрын
my payload attack won't work, my "request count" is 0 and i have no clue how to change it
@carolinepeace8196 ай бұрын
and i followed step-by-step this video.. so if you have an idea i need it
@stefel77656 ай бұрын
only video/writeup that helped me understand this one, thanks a lot!
@mike_on_tech5 ай бұрын
Glad it helped!
@cs06dhatchinamoorthy536 ай бұрын
Thanks ;)
@mike_on_tech5 ай бұрын
No problem
@draconightwalker49647 ай бұрын
thanks for this
@mike_on_tech7 ай бұрын
You're welcome
@SaaimSherif7 ай бұрын
This is excellent explanation. Kudos. Just one correction. @12:48, the ord() value of the second letter "i" is not changed to binary. Instead the binary value "0111000000000000" is converted back to decimal, which is "28672". Then they both are added and we get 28777. We then view it in hex, which is 7069^16 and the corresponding Japanese symbol. For anyone like me who's confused on the part where he adds both the binary values, here's the explanation. Thanks!
@mike_on_tech7 ай бұрын
Appreciate the correction.
@naif53508 ай бұрын
Man you’re really making things easier for me Thank you! I know I’m a little late but I can’t help but thank you for what you’re doing It’s truly amazing
@mike_on_tech7 ай бұрын
Happy to help!
@rdt7778 ай бұрын
why using static ?
@weijietan11788 ай бұрын
thanks for giving such a detailed explanation
@mike_on_tech8 ай бұрын
Glad it was helpful!
@yaserbit8 ай бұрын
Great content man, I appreciate these videos
@mike_on_tech8 ай бұрын
I appreciate that!
@_RevansiddappaDiggavi8 ай бұрын
how did you come to know that its robots,=.txt file
@mike_on_tech8 ай бұрын
This is one of those things that you learn once, then know to look for. Its a file that web crawlers read.
@trashdoc69205 ай бұрын
@@mike_on_tech but how did you know it was called Robots? Sorry this one is confusing to me
@trashdoc69205 ай бұрын
Never mind I see that its going to be called "robots.txt" in most cases lol. Thank you for the video!
@nicolaspanu74488 ай бұрын
Great content, many thanks!
@mike_on_tech8 ай бұрын
My pleasure!
@yaserbit8 ай бұрын
I really appreciate these videos man, they're really helpful
@mike_on_tech8 ай бұрын
Glad to hear it!
@LeanBeefPattygoneDark9 ай бұрын
Thank you ! I was stuck in this for a long time !! Love your in-depth explanation ❤
@mike_on_tech8 ай бұрын
Awesome, glad to help!
@weijietan11789 ай бұрын
very detailed explanation thank you!
@mike_on_tech9 ай бұрын
Glad you enjoyed it!
@weijietan11789 ай бұрын
hey sir, thanks for another detailed and well explained walk through, i just started ctf so this challenge was quite challenging and took a toll on me. im always loving your videos keep it up!
@mike_on_tech9 ай бұрын
Awesome, thanks for letting me know. Always makes my day to see comments like these!
@weijietan11789 ай бұрын
i have learnt so much again thank to you sir!
@weijietan11789 ай бұрын
best ctf tutor i love this channel!
@mike_on_tech9 ай бұрын
Thanks! Comments like these make my day!
@SoBatistaCyber9 ай бұрын
Hello Mike! I really enjoyed your video thank you very much for your content. On how to find what the flags mean, I was able to do that, though it took me ages. In this video: kzbin.info/www/bejne/iYTWc6CAf9CGgpIsi=7Kb7u5WfwnZ1sQap I talk about it. Feel free to take a look and once again great content! Cheers 😉
@pariskulkarni811310 ай бұрын
thx
@gokhantunay10 ай бұрын
asdkasmdolkmasod :D
@marammaloom10 ай бұрын
thank you for explaining it thoroughly!
@mike_on_tech10 ай бұрын
No worries!
@sarpogartis10 ай бұрын
echo 'string_to_be_decoded' | base64 --decode
@loandy684110 ай бұрын
Thx!
@RogueMellow11 ай бұрын
bro im unable to enter the cipher text but i can enter the modulus and e values
@mrspeedy8611 ай бұрын
so hard but 3000 view lol
@vaibhavsuri238911 ай бұрын
udp contains pico is not working
@addisonm.268511 ай бұрын
Thanks you, I’ve been working through all of these using your walk throughs and learning about each one
@mike_on_tech10 ай бұрын
Glad you like them!
@westramey723511 ай бұрын
Man! I owe you a case of beer or a nice dinner for you and your family. Dear lord the TLS dissectors section is so misleading. Who at Wireshark likes to do their work writing in ALL CAPS when it only accepts lowercase? That bugged me for hours and it didn't make any sense. Thank you truly! So much. That was driving me mad and making me feel dump. This helped so much.
@mike_on_tech11 ай бұрын
Thanks, glad to help. Have a good new year!
@phan5302 Жыл бұрын
Okay, this was a fun one
@68-pratikhanjagikar4 Жыл бұрын
U are awesome bro❤
@mike_on_tech11 ай бұрын
Thanks!
@tpt_transparent5179 Жыл бұрын
for some reason my gave me Errors No payload positions defined. anyone out there that could help
@robindiamondhands6416 Жыл бұрын
I decided to do some picoCTFs.. I was a bit disappointed by the brute force method.. I was thinking-- it cant possibly be pick and guess.. but sure enough.. I don't know much about python.. so I guess I am happy with this more in depth tutorial. This has been the worst picoCTF I've done so far, but mostly because I had to brute force it
@r4iden_11 ай бұрын
Brute force it with a script 🤦🏿♂️
@r4iden_11 ай бұрын
You do know you don't have to do it manually right u can change the python program to give the flag directly
@nhathai416 Жыл бұрын
how they know it is bitflip?
@duchuy.it97 Жыл бұрын
haha I love the way he explain 😄
@mudisabahahmad6139 Жыл бұрын
by far the worst youtube tutorial i have seen on this. why even help
@db5094 Жыл бұрын
Thank you
@mike_on_tech Жыл бұрын
You're welcome
@MidnightWill_ Жыл бұрын
/usr/bin/python: can't find '__main__' module in what does that mean
@nerdgammer3073 Жыл бұрын
anyone who is trying the above challenge take a note that --unicpher no more exists it is --decrypt ......... just run the python3 "scriptname" to see the help manpage