Another great trick is bit-flipping random chars in a Base64 key and then decoding it to ascii values for obfuscation. Pretty hard to reverse engineer.
@lancemarchetti8673Ай бұрын
cool
@soroushyaghoubi7709Ай бұрын
great video. thanks.
@waplet2 ай бұрын
Wow i like your approach on Mac doing Ubuntu pwns. Can you share dockerfile for "ubuntu-pwner" or is it something public? And maybe your Makefile?
@Vendetta7363 ай бұрын
hey im stuck on the WEB Linguist where i get to where i do the payload and I python3 to run the payload and it shows up the directory with where the flagtxt is suppose to be but it only shows flag.txt instead of the given flag for the challenge
@lepnoxicray73983 ай бұрын
was interested in java binex challenges found this instantly. I am finding you everywhere atp.
@ardhani13374 ай бұрын
Hi, i am also a mac os user, how do you run the elf binary to do the pwn challenge? i usually use vmware fusion, and it is very heavy on resources, any suggestions?
@ardhani13374 ай бұрын
it looks like you are using docker, can headless linux execute ELF file?
@SloppyJoePirates4 ай бұрын
I use an intel mac, but I asked on twitter what others do: x.com/c0nrad_jr/status/1831322396638564725
@benjaminatkin47454 ай бұрын
window.location can be blocked inside an actually - with child-src disallowing navigation to any exfiltratable locations, and popups disabled
@SloppyJoePirates4 ай бұрын
Ah right! and you can use sandbox attribute on csp. Hmm, maybe I'll need to revisit this. It still seems impossible imo to block all exfil, but I'm excited to see what you make!
@git-tauseef4 ай бұрын
That's amazing Subscribed!!!
@FakeEmail-v3q4 ай бұрын
Do you have a video going more in depth on format string vulnerabilities? Getting the libc addresses and creating the payload confuses me.
@iTZ_RedEye5 ай бұрын
They asking for password to unzip the file what I do. And which method you use to solve this Plz replay
@SloppyJoePirates4 ай бұрын
Hey @iTZ_RedEye, sorry for the delay. HTB will sometimes use 'hackthebox' as the password for their zip files
@pwoofy5 ай бұрын
hi! i was wondering how you managed to get the docker thing running, because when i tried to use the one listed in your description, it just shows: rosetta error: failed to open elf at /lib64/ld-linux-x86-64.so.2 Trace/breakpoint trap it would be appreciated if you could help, thanks!
@SloppyJoePirates4 ай бұрын
Hmm, are you on an M1 mac? You may have to use one of the solutions outlined here: x.com/c0nrad_jr/status/1831322396638564725
@MahmudulHasan-tg1x6 ай бұрын
In the forensics problem named "an-unusual-sighting" how did you extract this? It requires password!!
@ABDULKARIMHOMAIDI6 ай бұрын
please do you have any reference that may help me add the pwndbg to my gdb
@SloppyJoePirates4 ай бұрын
I'd check out github.com/pwndbg/pwndbg. There's install instructions depending on your system
@wutangdaug6 ай бұрын
jesus f crist, soloed the whole damn CTF. It's like beating an insane difficulty level of game that requires 5-person team work. Damn, this is hot.
@RewodTechnologies6 ай бұрын
unknown _idcodecodeName InvalidBSON% when using telnet in curl like this: curl “telnet://mongodb:27017” -T payload.raw -max-time 1 -o output.txt netcat works like this: cat payload.raw | nc localhost 27017, but i really need to use curl and telnet, any solution?
@dplastico6 ай бұрын
Love your videos <3 Do you pwn in an M1? I'm curious about the docker configuration you use (or how do you debug with gdb) Cheers and keep the videos going!
@dafaaqilla51856 ай бұрын
Same here, did u found it?
@SloppyJoePirates4 ай бұрын
Hey dplastico and dafaaqilla5185, sorry for the delay. I don't use an M1 mac, but I asked on twitter: x.com/c0nrad_jr/status/1831322396638564725
@HackWizFlEx7 ай бұрын
thanks for ur videos and we hope if u can share a link for these challs (if available).
@BinAdnan237 ай бұрын
In forensic challenge unusual sighting how to unzip file and open logs and ssh files?
@BinAdnan237 ай бұрын
Because there is password
@NoobPwn-hr4os7 ай бұрын
how did you find the counter address in the pwn/master-formatter-v2 "counter_address=stack__leak-292"
@marcush86987 ай бұрын
Completely new to bsides, is the CTF event still ongoing?
@SloppyJoePirates7 ай бұрын
Hey @marcush9698! Sadly, but there's usually a CTF every weekend, there's a list here: ctftime.org/
@markuche13377 ай бұрын
Awesome 😁
@r3plican7 ай бұрын
when u continue the series about pwn?
@SloppyJoePirates7 ай бұрын
Hey @r3plican, I won't be continuing CTF Cookbook. But the next Security Topics video series will contain some pwn videos!
@daniel010457 ай бұрын
For enough-with-the-averages I tried solving it with passing 'a' as the invalid input but thought it's impossible to calculate this way, but then my friend solved it with 'a' so... very cool to learn that a plus sign counts as invalid input but also flushes the buffer :)
@Xeno8817 ай бұрын
Format String Vulnerability in pwn,can you teach?
@SloppyJoePirates7 ай бұрын
I'd recommend checking out pwn.college, they have some videos and a set of challenges to practice with!
@shunt78197 ай бұрын
Nice writeup!! I had tcache poisoning in mind but 23:38 I solved it by overwriting a vtable ptr in bss. Got arb read by overwriting the ptr at 0xf0 after the string, but arb write was limited to bss and heap in my case didn't wanted to do it heap way cause I didn't have a proper pwndbg setup lol.
@danielfoudeh59157 ай бұрын
Quality stuff, keep it up!
@_2xfree7 ай бұрын
Wow you are fast, the heap peek and poke was completely killing me the entire ctf, kinda hurts to see how close I was to solving it. Definitely writing down the pwninit and patchelf trick. gg Also a small trick for the averages, since you are sending each input separately it's quite slow, you can send it all at once and it's much faster as stdin gets buffered, ```p.sendline(b'0 ' * i + b'- ' + b'0 ' * (19 - i))```