Security Topics #1: SECCOMP
19:19
8 ай бұрын
MetaCTF February Flash CTF Writeups
11:25
BackdoorCTF 2023 Writeups (5 pwn)
37:06
CybergonCTF 2023 Writeups (4x pwn)
20:23
UIUCTF 2023 Web Challenges
23:32
Жыл бұрын
printf leak - CTF Cookbook - pwn
4:49
Пікірлер
@oliverthomas700
@oliverthomas700 19 күн бұрын
Awesome!
@mokuamary
@mokuamary 26 күн бұрын
do you teach people to play ctf on the side?
@lancemarchetti8673
@lancemarchetti8673 Ай бұрын
Another great trick is bit-flipping random chars in a Base64 key and then decoding it to ascii values for obfuscation. Pretty hard to reverse engineer.
@lancemarchetti8673
@lancemarchetti8673 Ай бұрын
cool
@soroushyaghoubi7709
@soroushyaghoubi7709 Ай бұрын
great video. thanks.
@waplet
@waplet 2 ай бұрын
Wow i like your approach on Mac doing Ubuntu pwns. Can you share dockerfile for "ubuntu-pwner" or is it something public? And maybe your Makefile?
@Vendetta736
@Vendetta736 3 ай бұрын
hey im stuck on the WEB Linguist where i get to where i do the payload and I python3 to run the payload and it shows up the directory with where the flagtxt is suppose to be but it only shows flag.txt instead of the given flag for the challenge
@lepnoxicray7398
@lepnoxicray7398 3 ай бұрын
was interested in java binex challenges found this instantly. I am finding you everywhere atp.
@ardhani1337
@ardhani1337 4 ай бұрын
Hi, i am also a mac os user, how do you run the elf binary to do the pwn challenge? i usually use vmware fusion, and it is very heavy on resources, any suggestions?
@ardhani1337
@ardhani1337 4 ай бұрын
it looks like you are using docker, can headless linux execute ELF file?
@SloppyJoePirates
@SloppyJoePirates 4 ай бұрын
I use an intel mac, but I asked on twitter what others do: x.com/c0nrad_jr/status/1831322396638564725
@benjaminatkin4745
@benjaminatkin4745 4 ай бұрын
window.location can be blocked inside an actually - with child-src disallowing navigation to any exfiltratable locations, and popups disabled
@SloppyJoePirates
@SloppyJoePirates 4 ай бұрын
Ah right! and you can use sandbox attribute on csp. Hmm, maybe I'll need to revisit this. It still seems impossible imo to block all exfil, but I'm excited to see what you make!
@git-tauseef
@git-tauseef 4 ай бұрын
That's amazing Subscribed!!!
@FakeEmail-v3q
@FakeEmail-v3q 4 ай бұрын
Do you have a video going more in depth on format string vulnerabilities? Getting the libc addresses and creating the payload confuses me.
@iTZ_RedEye
@iTZ_RedEye 5 ай бұрын
They asking for password to unzip the file what I do. And which method you use to solve this Plz replay
@SloppyJoePirates
@SloppyJoePirates 4 ай бұрын
Hey @iTZ_RedEye, sorry for the delay. HTB will sometimes use 'hackthebox' as the password for their zip files
@pwoofy
@pwoofy 5 ай бұрын
hi! i was wondering how you managed to get the docker thing running, because when i tried to use the one listed in your description, it just shows: rosetta error: failed to open elf at /lib64/ld-linux-x86-64.so.2 Trace/breakpoint trap it would be appreciated if you could help, thanks!
@SloppyJoePirates
@SloppyJoePirates 4 ай бұрын
Hmm, are you on an M1 mac? You may have to use one of the solutions outlined here: x.com/c0nrad_jr/status/1831322396638564725
@MahmudulHasan-tg1x
@MahmudulHasan-tg1x 6 ай бұрын
In the forensics problem named "an-unusual-sighting" how did you extract this? It requires password!!
@ABDULKARIMHOMAIDI
@ABDULKARIMHOMAIDI 6 ай бұрын
please do you have any reference that may help me add the pwndbg to my gdb
@SloppyJoePirates
@SloppyJoePirates 4 ай бұрын
I'd check out github.com/pwndbg/pwndbg. There's install instructions depending on your system
@wutangdaug
@wutangdaug 6 ай бұрын
jesus f crist, soloed the whole damn CTF. It's like beating an insane difficulty level of game that requires 5-person team work. Damn, this is hot.
@RewodTechnologies
@RewodTechnologies 6 ай бұрын
unknown _idcodecodeName InvalidBSON% when using telnet in curl like this: curl “telnet://mongodb:27017” -T payload.raw -max-time 1 -o output.txt netcat works like this: cat payload.raw | nc localhost 27017, but i really need to use curl and telnet, any solution?
@dplastico
@dplastico 6 ай бұрын
Love your videos <3 Do you pwn in an M1? I'm curious about the docker configuration you use (or how do you debug with gdb) Cheers and keep the videos going!
@dafaaqilla5185
@dafaaqilla5185 6 ай бұрын
Same here, did u found it?
@SloppyJoePirates
@SloppyJoePirates 4 ай бұрын
Hey dplastico and dafaaqilla5185, sorry for the delay. I don't use an M1 mac, but I asked on twitter: x.com/c0nrad_jr/status/1831322396638564725
@HackWizFlEx
@HackWizFlEx 7 ай бұрын
thanks for ur videos and we hope if u can share a link for these challs (if available).
@BinAdnan23
@BinAdnan23 7 ай бұрын
In forensic challenge unusual sighting how to unzip file and open logs and ssh files?
@BinAdnan23
@BinAdnan23 7 ай бұрын
Because there is password
@NoobPwn-hr4os
@NoobPwn-hr4os 7 ай бұрын
how did you find the counter address in the pwn/master-formatter-v2 "counter_address=stack__leak-292"
@marcush8698
@marcush8698 7 ай бұрын
Completely new to bsides, is the CTF event still ongoing?
@SloppyJoePirates
@SloppyJoePirates 7 ай бұрын
Hey @marcush9698! Sadly, but there's usually a CTF every weekend, there's a list here: ctftime.org/
@markuche1337
@markuche1337 7 ай бұрын
Awesome 😁
@r3plican
@r3plican 7 ай бұрын
when u continue the series about pwn?
@SloppyJoePirates
@SloppyJoePirates 7 ай бұрын
Hey @r3plican, I won't be continuing CTF Cookbook. But the next Security Topics video series will contain some pwn videos!
@daniel01045
@daniel01045 7 ай бұрын
For enough-with-the-averages I tried solving it with passing 'a' as the invalid input but thought it's impossible to calculate this way, but then my friend solved it with 'a' so... very cool to learn that a plus sign counts as invalid input but also flushes the buffer :)
@Xeno881
@Xeno881 7 ай бұрын
Format String Vulnerability in pwn,can you teach?
@SloppyJoePirates
@SloppyJoePirates 7 ай бұрын
I'd recommend checking out pwn.college, they have some videos and a set of challenges to practice with!
@shunt7819
@shunt7819 7 ай бұрын
Nice writeup!! I had tcache poisoning in mind but 23:38 I solved it by overwriting a vtable ptr in bss. Got arb read by overwriting the ptr at 0xf0 after the string, but arb write was limited to bss and heap in my case didn't wanted to do it heap way cause I didn't have a proper pwndbg setup lol.
@danielfoudeh5915
@danielfoudeh5915 7 ай бұрын
Quality stuff, keep it up!
@_2xfree
@_2xfree 7 ай бұрын
Wow you are fast, the heap peek and poke was completely killing me the entire ctf, kinda hurts to see how close I was to solving it. Definitely writing down the pwninit and patchelf trick. gg Also a small trick for the averages, since you are sending each input separately it's quite slow, you can send it all at once and it's much faster as stdin gets buffered, ```p.sendline(b'0 ' * i + b'- ' + b'0 ' * (19 - i))```