BAD RANSOMWARE - HackTheBox Business CTF

  Рет қаралды 53,045

John Hammond

John Hammond

Күн бұрын

Пікірлер: 59
@ulissesalvesoffsec
@ulissesalvesoffsec 3 жыл бұрын
Hey, John... A little tip for printing chars in lists with print instead of having to make list comprehension: print(var, end="") This will print the data without the default newline.
@CodeMonkeyNinja
@CodeMonkeyNinja 3 жыл бұрын
You've mentioned `sleep(0)` does nothing, and from your purpose of deobfuscation, I'm sure it's just an obstacle, but it's a method of yielding the thread, so that an application can share the CPU with other processes running on O/S and not "feel like" the application is hung (for small threads you really want to get the task completed ASAP so you don't even `sleep(0)`, but for threads that takes a while, it's an essential technique to make sure the app isn't greedy)
@gabagoul67
@gabagoul67 3 жыл бұрын
why wouldnt you want your app to feel greedy? is that something an anti virus can detect?
@CodeMonkeyNinja
@CodeMonkeyNinja 3 жыл бұрын
@@gabagoul67 it just makes the PC (running the O/S, environments (i.e. desktop) and the app) feel locked/hung. What you do not want is users to think "something is wrong" because your PC is going sluggish (meaning, you can probably tell without anti-virus). Yielding allows O/S to prioritize/schedule (fairly) the time slices to keep your O/S responsive. Try writing a simple hello-world in your favorite language of your choice, with an infinite loop without any yielding to the O/S. Then try moving your mouse around (if you're on desktop) or something, on that same session. Then, try adding a yielding instruction...
@gabagoul67
@gabagoul67 3 жыл бұрын
@@CodeMonkeyNinja thank you so much for taking the time to answer. really appreciated
@GaryFrancis-q3r
@GaryFrancis-q3r 3 жыл бұрын
And this is 1 out of 4 in terms of difficulties?... Whau, what a 4/4 must be?! Super dooper difficult :) Your videos are amazing John! Thanks a lot! ;) Cheers
@nickheyer
@nickheyer 3 жыл бұрын
when youve done it several times, you get an idea of things you need to look for, even on higher difficulty
@StevenIngram
@StevenIngram 3 жыл бұрын
Very nice. And your videos are starting to make me realize how riddled with vulnerabilities our world is. LOL Scary.
@viv_2489
@viv_2489 3 жыл бұрын
Always pleasure to watch these videos.. so much hard work behind...
@chiragartani
@chiragartani 3 жыл бұрын
Wow you solved this in 22 min. 👏 Awesome ❤️
@real_proxymous
@real_proxymous 3 жыл бұрын
actually he did it 20 min and 33 sec
@jacobdavidcunningham1440
@jacobdavidcunningham1440 3 жыл бұрын
Damn that was really neat Crazy the lengths it goes to obfuscate
@davecoates2308
@davecoates2308 3 жыл бұрын
V nice. Enjoyed this! Thank you
@TheKSH991
@TheKSH991 3 жыл бұрын
Man i wish these challenges are available like the boxes on htb would love to try them myself
@tapac5183
@tapac5183 3 жыл бұрын
good job !!!
@svilenSt.
@svilenSt. 3 жыл бұрын
Well done John! I like your way to move fast in research process. Thank's for share :)
@_Omni
@_Omni 3 жыл бұрын
Holy balls! Daily videos 🤗
@sob3ygrime
@sob3ygrime 3 жыл бұрын
Awesome video thanks
@neilthomas5026
@neilthomas5026 3 жыл бұрын
Very epic as always
@erosmlima5981
@erosmlima5981 3 жыл бұрын
Aw3some!
@MM-kd1zf
@MM-kd1zf 3 жыл бұрын
Love you too John ❤️
@FluePeak
@FluePeak 3 жыл бұрын
Dont know what you are doing, neither am i good at code or enything but daym this is fun to watch
@Irisilol
@Irisilol 3 жыл бұрын
Your videos are amazing!
@zaedabdullah2015
@zaedabdullah2015 3 жыл бұрын
always love your video. Hope. this pandemic will over
@stayaway9828
@stayaway9828 3 жыл бұрын
Why don't you use a debugger to automate deobfuscation?
@bhagyalakshmi1053
@bhagyalakshmi1053 Жыл бұрын
How to creation also filename creation for go 'r ✍️'!
@drahoxx3076
@drahoxx3076 3 жыл бұрын
Which linux distribution is it ?
3 жыл бұрын
i asked to myself, where is the Master's daily works and you are in there, im too hapy , thx for videos
@rasulmuhammad2343
@rasulmuhammad2343 3 жыл бұрын
How did you select all the sleep words and delete only them
@harvuk7729
@harvuk7729 3 жыл бұрын
find and replace with null
@sageinquisitor
@sageinquisitor 3 жыл бұрын
Why don't you just run the code with the powershell command commented out and echo the output?
@alisarwar3399
@alisarwar3399 3 жыл бұрын
john i am a freshie , and i want to learn cyber secuirty. can you suggest me anything i can learn with my university life? so i can be like you someday????
@MBND156
@MBND156 3 жыл бұрын
Now i remember why i love coding
@bahai02
@bahai02 3 жыл бұрын
Then you must teach me
@FuTunisia
@FuTunisia 3 жыл бұрын
Random question, do you think burpsuite pro is worth it ?
@russnemet1158
@russnemet1158 3 жыл бұрын
Pen-testing or for hack the box?
@FuTunisia
@FuTunisia 3 жыл бұрын
@@russnemet1158 for all purposes
@0xechidonut
@0xechidonut 3 жыл бұрын
Definitely
@soojinchong8354
@soojinchong8354 3 жыл бұрын
Waiting R.E category 😋😋
@tylercoombs1
@tylercoombs1 Жыл бұрын
This looks like it was probably the same author as the original VB script, it's almost a 1:1
@ankitminz5872
@ankitminz5872 3 жыл бұрын
They love trigonometry lol
@Shorstopmwd
@Shorstopmwd 3 жыл бұрын
As opposed to...good ransomware?
@mattplaygamez
@mattplaygamez 3 жыл бұрын
LoL
@SuperHolySheep
@SuperHolySheep 3 жыл бұрын
The only good ransomeware is porn
@phantom18x
@phantom18x 3 жыл бұрын
If you want your files back, you need to take this 1 million dollars...or else...
@kc-me6wl
@kc-me6wl 3 жыл бұрын
@@phantom18x lool
@bhagyalakshmi1053
@bhagyalakshmi1053 Жыл бұрын
Laptop 21 time for you skills collection of the two letters again again to repeating coming computer using and typing per versus there are available for laptop work is eg.
@bhagyalakshmi1053
@bhagyalakshmi1053 Жыл бұрын
Word neber 12,&15&abtrnamer
@ce5248
@ce5248 3 жыл бұрын
no
@brandonevans5123
@brandonevans5123 3 жыл бұрын
yes
@kc-me6wl
@kc-me6wl 3 жыл бұрын
Maybe?
@kadensharpin2156
@kadensharpin2156 3 жыл бұрын
docm-alware
Google Ad Promotes Fake Homebrew Malware
24:47
John Hammond
Рет қаралды 56 М.
JScript Deobfuscation - More WSHRAT (Malware Analysis)
1:02:01
John Hammond
Рет қаралды 59 М.
JSON Web Keys (JWK & JWT) - "Emergency" - HackTheBox Business CTF
29:09
HTB Business CTF 2024 - Solving the Watersnake challenge by Ippsec
25:44
How Hackers Write Malware & Evade Antivirus (Nim)
24:04
John Hammond
Рет қаралды 419 М.
TARGETED Phishing - Fake Outlook Password Harvester
47:09
John Hammond
Рет қаралды 259 М.
IFrame Parent XSS - HackTheBox Cyber Apocalypse CTF
32:03
John Hammond
Рет қаралды 73 М.
MALWARE ANALYSIS - VBScript Decoding & Deobfuscating
42:23
John Hammond
Рет қаралды 1 МЛН
Detection Engineering with Wazuh
30:23
John Hammond
Рет қаралды 18 М.
HackTheBox "Business CTF" - Time - Command Injection
16:02
John Hammond
Рет қаралды 36 М.