Who can decode this public key to extract private key 1btc 1BDvQZjaAJH4ecZ8aL3fYgTi7rnn3o2thE Pubkey 04ea0d6650c8305f1213a89c65fc8f4343a5dac8e985c869e51d3aa02879b57c60cff49fcb99314d02dfc612d654e4333150ef61fa569c1c66415602cae387baf7
@prathameshgawade5362 күн бұрын
I absolutely love you. What a method man.
@ismailkerouata39483 күн бұрын
Hovered over ROP tutorials for 1hour then remembered LiveOverflow exists. Best explanation. A pwning gold mine
@iAmhATTER3 күн бұрын
@LiveOverflow Hextree should have a built-in compiler on the site for each user to use in each class. I guess I mean it should include the needed tools to do the class in the browser.
@dreadserpant5 күн бұрын
Another example of client-server/IPC technology could be Pipestream.
@rida_brahim5 күн бұрын
your channel is just amazing.
@olegkapustkin35686 күн бұрын
Hi, thanks for the video. I‘m getting into reverse engineering and find it really fastinating. Could you tell me are there any job oportunity in this area other then pentesting/security.
@ONEGOALONEJOURNEY8 күн бұрын
i still cant figure out why using service option followed by "AAA " it writes into heap?
@HughTube-t6l8 күн бұрын
Chat gpt wasn't able to make a good programmed table trainer fpr you kids. It kept to kg between a class and a def. Even the newest ChatGPT.
@otur19 күн бұрын
Using sudo can make a breach traceable as in which account was hacked. Disabling sudo in Linux is just as dumb as disabling UAC in Windows.
@NinjaMacGyver10 күн бұрын
After I fought Mewtwo that's I did mission glitch and got infinite Mewtwo
@drcyb3r11 күн бұрын
There are also CTFs that are downloadable VMs for VMware. This VM then runs services or has open ports you need to get into. Sometimes they allow for different ways of intrusion. Our assignment during job training was to find one (or more) ways and describe them in detail in a document. It was a lot of fun and my team found 3 ways to get into one (with only 2 officially documented on the website). Sadly I never tried it again after taht as I didn't have the time to do so.
@drcyb3r11 күн бұрын
I did a few CTFs during my job training time in IT. It's not very common but one of the teachers had this idea and it was very fun and interesting.
@discordiangod11 күн бұрын
Chatgpt is actually why I got back in cybersec; Idk if Ill ever get a job in it but f it man, Im back
@jimoberhansli778211 күн бұрын
I hate hackers.
@SyedMSawaid12 күн бұрын
Went to my first hackerspace. And damn, it was awesome.
@noyanogeday12 күн бұрын
Hello, can we find the license key of an exe file with HWID protection?
@yohanespradono522413 күн бұрын
i really wanted to crack a program because there's no crack available on internet so I learned reverse engineering in 2 days and successfully cracked a program 😂
@mstckz12 күн бұрын
Where did u learn it?
@geragera534213 күн бұрын
The program that used to pay for bugs on 100 million download apps is not active anymore
@shunsuke795013 күн бұрын
It seems like memory address is not mapped when in my file when i run the gdb. So ghidra address couldnt be breakpointed. What to do?
@DonatStratos14 күн бұрын
Great content, as always! Just a quick off-topic question: I have a SafePal wallet with USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). How can I transfer them to Binance?
@ShaquilleMagnusson14 күн бұрын
Thanks for the forecast! I have a quick question: I have a SafePal wallet with USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). How should I go about transferring them to Binance?
@DonnieDeponte14 күн бұрын
Appreciate the detailed breakdown! Could you help me with something unrelated: I have a SafePal wallet with USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). How should I go about transferring them to Binance?
@88spaces14 күн бұрын
Fantastic! I'm just starting the same exercise. So exciting!
@beaconoid15 күн бұрын
make a vid on how to do it or link one
@g4stLL16 күн бұрын
I'm deep into security now with a lot of experience, this seems fun but also like a another insane rabbit hole for me to follow XD, also I have an Iphone now and lost my android, so that's even one more layer to the challenge!
@killingtime928317 күн бұрын
Really interesting 🙂
@Null-c7i17 күн бұрын
I'm currently creating a custom file type for my company, nearly finished it. Where I don't disagree entirely I would say a better way to look at it is a file type is designed and the tools or libraries that interact with it are coded with an understanding the designed structure. The file type is a concept and needs code to create it or read it, it technically doesn't exist beyond the concept of the structure. In simplest terms it's a structure in which data is stored.
@frenches199517 күн бұрын
Finally a video where I simply understood everything. It's not the first one but it's a while ago when I just understood everything in one of your videos. Schönen Tag noch!
@logicisthejuice324017 күн бұрын
Incredibly helpful! Currently, studying for a CompTIA cert. This creates a perfect mental framework so that I can see the abstract concepts clearly. Thanks!
@justcurious194019 күн бұрын
Does the VPN client takes over the layers below the Network layer or the OS will still do it ?.
@lunte019819 күн бұрын
How "reverse engineering" works in js: >open file >read it
@saravananarumugam587220 күн бұрын
For me in x86. Oracle virtual box vm. The python code. b"xCC" *4 is not working properly Can some one know the reason
@moroccan_pentester20 күн бұрын
video after video I get more addicted to this channel
@AlbySilly21 күн бұрын
I've been staring at packets for what feels like weeks by now, I just can't make sense of what I'm seeing. I can see about 4 or 5 unique package headers (or twice, depending on how you count) I understand that there's a timer, 2 bytes for milliseconds, and maybe another one using 4 bytes, though I'm not sure since the data is ever changing for those packets But the data itself doesn't yet make sense, there are rare occurrences where one of the package types contains plaintext so it can't be encrypted right? But there doesn't seem to be many patterns to decode the packets outside of the things I've mentioned so far...
@redrekon23 күн бұрын
I never knew under the hood this much happing 😮😮
@humphreeyy23 күн бұрын
Next step is sqp injection
@BZ-nb2rh24 күн бұрын
how do you even download cheatengine, even without antivirus enabled?
@nitsanbh24 күн бұрын
this is amazing
@labguy949224 күн бұрын
hawk tuah
@labguy949224 күн бұрын
🤣🤣🤣🤣🤣🤣🤣🤣🤣
@brunovarela1024 күн бұрын
Its a nice tutorial bro, i using this video, watch guide hacking too, i dont have the best english, but its help me. thanks for videos.
@anand_bhasme25 күн бұрын
Student discount plan please?
@nullnull603225 күн бұрын
You ddi not explain anything at all. The whole point is in the race condition and why it happens.
@benjith1726 күн бұрын
I don't like this video because it makes me feel incredibly stupid. All the people in this are so smart and are coming up with really cool tricks and exploits. Please make a second series
@jpphoton27 күн бұрын
my ninja - good stuff learned here.
@3xpl0i7928 күн бұрын
Hey liveoverflow, can you make a video on hunting for CVEs, your methodology and ideas?
@Hank-Random28 күн бұрын
Boring, boring, boring🥱🥱🥱🥱
@noyanogeday28 күн бұрын
How can we crack a HWID license controlled exe file?