Exploiting C strstr Function (PicoCTF 2022 #37 'rps')

  Рет қаралды 12,865

John Hammond

John Hammond

Күн бұрын

Пікірлер: 17
@thetrollingboss3155
@thetrollingboss3155 2 жыл бұрын
Wow, that's amazing! I did not even realize the strstr function was vulnerable during the competition and ended up doing some good 'ol PRNG abuse
@0xTas
@0xTas 2 жыл бұрын
That was a fun little exercise in reversing a program's logic, nice video.
@majoryoshi
@majoryoshi 2 жыл бұрын
The only proper way to win at RPS. I know these are designed to be easier but holy cow this made me laugh so hard at how stupid the answer was
@Lodinn
@Lodinn 2 жыл бұрын
Tbf given a win is possible playing "normally" one might as well just brute force it.
@kawzaki
@kawzaki 2 жыл бұрын
The moment I saw strstr I guessed put all of them in as one word. Funny! Then funny how the flag reads some extreme luck ! Hahaha
@noideawhatever
@noideawhatever Жыл бұрын
I searched what is strstr and figured the loophole out right away :D
@mrhappytroll
@mrhappytroll 2 жыл бұрын
Im proud of myself for figuring this out just by pausing and looking at the source code haha
@bhagyalakshmi1053
@bhagyalakshmi1053 Жыл бұрын
Ok full pics and videos season.
@djibrille31
@djibrille31 2 жыл бұрын
Why does he use the ? sign in the grep command regular expression? Is it not enough to just use the ".*" like grep -oE "picoCTF{.*}". It drives me mad that I do not get it.
@Lodinn
@Lodinn 2 жыл бұрын
If the output contains another closing bracket, greedy capture would get the entirety of it. Not necessary here, but it's a good habit to have when dealing with regex matching something in brackets.
@lucidattf
@lucidattf 2 жыл бұрын
if the text content for example included picoCTF{aaaaa}aaaaa and then another }, the grep without the question mark would output "picoCTF{aaaaa}aaaaa and then another }"
@bladesvlogs4965
@bladesvlogs4965 2 жыл бұрын
Would never have gotten that one 🤪
@AmanPatel-rv2it
@AmanPatel-rv2it 2 жыл бұрын
That's nice - just strstr being my cousin 😂😂
@vanfrancisco4573
@vanfrancisco4573 2 жыл бұрын
Lmao, i have been tinkering the program only not to notice that the category was not a reverse engineering problem but a binary exploitation problem. stupid me. LOL
@lordspacecake5565
@lordspacecake5565 2 жыл бұрын
Very neat trick
@jeffer746
@jeffer746 2 жыл бұрын
i just spammed the program with paper 5000 times until it won lol
@unutilisateurdeyoutube1256
@unutilisateurdeyoutube1256 2 жыл бұрын
you spam five times rockpaperscissors and it wins xd
СКОЛЬКО ПАЛЬЦЕВ ТУТ?
00:16
Masomka
Рет қаралды 1,9 МЛН
Disrespect or Respect 💔❤️
00:27
Thiago Productions
Рет қаралды 37 МЛН
HELP!!!
00:46
Natan por Aí
Рет қаралды 56 МЛН
Human vs Jet Engine
00:19
MrBeast
Рет қаралды 202 МЛН
GHIDRA for Reverse Engineering (PicoCTF 2022 #42 'bbbloat')
17:44
John Hammond
Рет қаралды 218 М.
The AI Cybersecurity future is here
26:42
David Bombal
Рет қаралды 163 М.
Return Oriented Programming (PicoCTF 2022 #48 'ropfu')
35:09
John Hammond
Рет қаралды 22 М.
Learn Reverse Engineering (for hacking games)
7:26
cazz
Рет қаралды 1,1 МЛН
Diffie-Helman Key Exchange (PicoCTF 2022 #32 'diffie-helman')
30:25
Running a Buffer Overflow Attack - Computerphile
17:30
Computerphile
Рет қаралды 2 МЛН
Format String printf Vulnerabilities (PicoCTF 2022 #46 'flag-leak')
19:44
Morse Code for CTFs (PicoCTF 2022 #16 'morse-code')
12:37
John Hammond
Рет қаралды 15 М.
СКОЛЬКО ПАЛЬЦЕВ ТУТ?
00:16
Masomka
Рет қаралды 1,9 МЛН