Deobfuscating Python Code (PicoCTF 2022 #30 'bloat.py')

  Рет қаралды 66,490

John Hammond

John Hammond

Күн бұрын

Пікірлер: 44
@getellied
@getellied 2 жыл бұрын
I love how this challenge was easy to me just because of all your malware analysis vids
@MarsCorporations
@MarsCorporations 2 жыл бұрын
replacing characters is so basic, this should not even count as "obfuscated" 😅
@Icelink256
@Icelink256 2 жыл бұрын
Ciphers are incredibly common in cryptography, it's just that they're usually combined with multiple other methods to further obfuscate the data. NES games used bitshifting and XOR in their passwords, for example. With a simple substitution cipher, to show the player the resulting data in a human-readable way. So, it could be written down, for later.
@plut4580
@plut4580 2 жыл бұрын
great content John, this challenges are really great to learn every time something new. When a new malware-analysis video will come out?
@danhene6594
@danhene6594 2 жыл бұрын
Brilliant move using a python instance to translate, new to CTFs but I’ll be trying that in the future for sure
@QuickFixHicks914
@QuickFixHicks914 2 жыл бұрын
I love your content John you give me a new perspective on how to look at problems. Thank you.
@realitynowassigned
@realitynowassigned 2 жыл бұрын
Doesn't presume the viewer to be an idiot or a genius or fill the videos with fluff. It's hard to find anything like it. I learn more about python watching him dissect it in one video than anything else in several
@sworatex1683
@sworatex1683 Жыл бұрын
This video looks like it will be scary to people that have never programmed but look absolutely easy for people with basic understanding
@bladesvlogs4965
@bladesvlogs4965 2 жыл бұрын
You make it look so easy 👍
@kris5187
@kris5187 2 жыл бұрын
Dude, your face structure deserves some chops, no cap xD Great content as always my dude
@realitynowassigned
@realitynowassigned 2 жыл бұрын
Internet security is so broad that what is easy for 1000 is difficult for 1 and vice versa
@pravinloke4000
@pravinloke4000 Жыл бұрын
Thanks for sharing...
@tappineapple3381
@tappineapple3381 2 жыл бұрын
Btw there is more than just an xor happening in the decryption algorithm.
@rav04o2
@rav04o2 2 жыл бұрын
What is the purpose of the save and finish commands?
@DaniSpeh
@DaniSpeh 2 жыл бұрын
It's in one of the first picoctf videos. There was some easy challenge and time left so he created 2 scripts in bash. I think the save script saves the flag in flag.txt, if I remember correct , and finish adds _COMPLETED to the the directory name so you know the challenge is completed. You don't need those scripts to finish a challenge, they are his own quality-of-life scripts. But you'll learn some scripting watching this video
@viv_2489
@viv_2489 2 жыл бұрын
Too many great videos unleashed
@whoami-so2hy
@whoami-so2hy 2 жыл бұрын
thanks for sharing
@lordspacecake5565
@lordspacecake5565 2 жыл бұрын
Great content!!
@mohitpannu27
@mohitpannu27 2 жыл бұрын
Sir… can we de-obfuscate python PyArmor
@MrKyubiSasuke
@MrKyubiSasuke 2 жыл бұрын
love the content
@Majed_Babili
@Majed_Babili 2 жыл бұрын
🌷❤️ Great content
@ruthvikas
@ruthvikas Жыл бұрын
I was such a dumb guy, instead of python replacing all the strings what i did was print the index and value of that 'a' string and i manually found and replaced it. Such a dumb way to do it.
@flamendless
@flamendless 2 жыл бұрын
Cant just one run the obfuscated python file?
@bhagyalakshmi1053
@bhagyalakshmi1053 Жыл бұрын
Ki dra file using coffee to paste and coming for you code minchin attend I know I see it for you this file work is very easy
@2Craft_
@2Craft_ Жыл бұрын
someone got this for pyarmor?
@Bowzerbro
@Bowzerbro 2 жыл бұрын
Lovely
@booruledie3052
@booruledie3052 2 жыл бұрын
Great
@lingyong1111
@lingyong1111 2 жыл бұрын
Has Ed Sheeran changed his profession?
@andehhhhhhh
@andehhhhhhh 2 жыл бұрын
Music is just his side gig
@tom50586
@tom50586 2 жыл бұрын
bruh this isnt even obfuscation. I'd like to see you reverse a custom vm written in pure python
@xBosil
@xBosil 2 жыл бұрын
Bro i was scrolling through coments and didn't expect to find federal
@prodigyprogrammer3187
@prodigyprogrammer3187 2 жыл бұрын
Cool
@f1rem0th
@f1rem0th 2 жыл бұрын
A good video but your solution was way overkill. Could have just returned true in arg133() that had the obvious check in it.
@P-e-r-s-i-AI
@P-e-r-s-i-AI 2 жыл бұрын
Niceeeeeeeeeee
@RandomytchannelGD
@RandomytchannelGD 3 ай бұрын
Hi
@bhagyalakshmi1053
@bhagyalakshmi1053 Жыл бұрын
Red flags
@Holzf43ller
@Holzf43ller 2 жыл бұрын
It seems to me, that approximately 99.999% of the Python Code i get or see looks like the obfuscated CTF-File. And always this is just the pythonic way to do things. With loads of comments like "// get np for xxx" because everyone knows that np means numpy, right? Anyway.... i like Python as a Programming language... most programming styles of this language i strongly dislike. Also: nice video
@tacos7522
@tacos7522 2 жыл бұрын
i'm no coder lol but i've deobfuscated worse stuff haha.
@guilherme5094
@guilherme5094 2 жыл бұрын
👍
@jasonbourne7950
@jasonbourne7950 2 жыл бұрын
But not view
@amirkiani2253
@amirkiani2253 2 жыл бұрын
First comment and like
@Matt-nx6uu
@Matt-nx6uu 2 жыл бұрын
Haha Python -_-
@ophello
@ophello 2 жыл бұрын
It’s “how do they look” or “what do they look like.” Not “how do they look like.” That’s an English mistake that foreigners make, and that now native English speakers are starting to become corrupted by.
How Hackers Hide
20:55
John Hammond
Рет қаралды 240 М.
Don’t Choose The Wrong Box 😱
00:41
Topper Guild
Рет қаралды 62 МЛН
小丑女COCO的审判。#天使 #小丑 #超人不会飞
00:53
超人不会飞
Рет қаралды 16 МЛН
GHIDRA for Reverse Engineering (PicoCTF 2022 #42 'bbbloat')
17:44
John Hammond
Рет қаралды 224 М.
How to Make a Real Diamond - (Not Clickbait)
8:51
JerryRigEverything
Рет қаралды 669 М.
Deciphering Obfuscated JavaScript Malware
31:12
LaurieWired
Рет қаралды 83 М.
I 3D Printed a $1,500 Chair
23:09
Morley Kert
Рет қаралды 530 М.
5 Good Python Habits
17:35
Indently
Рет қаралды 661 М.
how reverse engineering makes you a better programmer
13:12
Low Level
Рет қаралды 208 М.
Diffie-Helman Key Exchange (PicoCTF 2022 #32 'diffie-helman')
30:25
Unraveling a REMOTE ACCESS TROJAN (VBScript Deobfuscation)
31:20
John Hammond
Рет қаралды 163 М.
Where Does Bad Code Come From?
42:21
Molly Rocket
Рет қаралды 205 М.
Don’t Choose The Wrong Box 😱
00:41
Topper Guild
Рет қаралды 62 МЛН