I feel represented every time he puts his hand to his forehead and laughs at how crazy this challenge is.
@viniciusalmeida70374 жыл бұрын
It's not everyday that you find your professor on the comment section of a random video.
@j3r3miasmg4 жыл бұрын
@@viniciusalmeida7037 HAHAHAHA
@SauravKumar-tf3uv4 жыл бұрын
It's always great to hear technical conversations :). You really should do it more
@fakhermokadem114 жыл бұрын
Should you have listen to Google CTF writers explain their thought train for 40minutes again? Heck yeah!
@fluffy_tail43654 жыл бұрын
This challenge is nuts and I love how the code is public, is such a lovely implementation and actually pretty useful. Thanks for letting me discover it
@gecko4ever4 жыл бұрын
Great interview, very interesting. Thanks for the detailled analysis and explanation together with Robin and Gynvael.
@nilp0inter24 жыл бұрын
It was a very clever move to just use the round function of the feistel network to make the decryption function. Good thinking!
@uniquechannelnames3 жыл бұрын
Oh yeeaaah totes clever move, couldnt believe how the round function of the feistel network made the decryption function... I feel so lacking in knowledge haha.I *barely* understood it.
@wuddadid4 жыл бұрын
I know absolutely nothing.
@nickadams23613 жыл бұрын
besides that.
@tuz20444 жыл бұрын
Yes please! More of this :D
@pipony89394 жыл бұрын
that's the last one /s
@CodePhiles4 жыл бұрын
great interview , with intense of ideas !!, the approach of the team who solved it was great to get the function of the black box
@bigmistqke4 жыл бұрын
Loving this serie!
@arunmagesh4 жыл бұрын
damn! FPGA on gpu is something else. 😯😯😯
@mushenji3 жыл бұрын
Very cool
@bluegizmo19834 жыл бұрын
Most of that went way over my head but I still loved it!
@lightb00k344 жыл бұрын
Make more videos of these format please 😍😍
@bhuvaneshs.k6383 жыл бұрын
This video is great.... Thankyou for this video
@CyReVolt4 жыл бұрын
Mindblowing and decent - really cool, thank you! :)
@hadinossanosam44593 жыл бұрын
watching this to procrastinate preparing for my VLSI I exam (Verilog, RTL, FPGA programming, HLS, ...) xD motivation is weird
@snooks56073 жыл бұрын
impressive on many levels
@robinhood38414 жыл бұрын
I am really really curious to know how browser challenge exploitation was and how the teams manage to solve that challenge
@allthingsreversed4 жыл бұрын
2019 - the year when one could cough from (I guess) air conditioning while being closer than 2m from other person - good year ;) Also good video & interview! And indeed interesting chall. Please do more.
@natnaieleasrat97864 жыл бұрын
You're awesome!
@superhero14 жыл бұрын
Your content is awesome! Greetings
@dxdarrel88434 жыл бұрын
That Rust source code is actually difficult understand by itself, let alone reverse engineer the compiled binary.......
@rickyhan70234 жыл бұрын
What an absolute Chad 🤣
@nickadams23613 жыл бұрын
jesus man what a boss
@devilmaycry19804 жыл бұрын
That was pretty cool :D
@movax20h3 жыл бұрын
I just played a bit with it, extracted the shader, and they didn't even enabled size or speed optimisation, and left all debug information (like identifiers, function names, uninlined). Indeed disasembly using SPIRV-Cross was perfect. It recovered full source code back with variable names, and code structure intact. Doing a quick `spirv-opt --strip-debug -O` would really make things harder. But I guess, it is fine, just some fun, and limited time.
@rob61294 жыл бұрын
Very interesting
@SangharshSeth4 жыл бұрын
Great video. Please upload other challenges from gctf if possible.
@jhbonarius4 жыл бұрын
Many commercial FPGAs encrypt their bitstream nowadays, to prevent reverse engineering
@allmycircuits88504 жыл бұрын
There are also FPGAs with embedded code ROM, so no code 'leaks' outside at all. Then there is 'security bit', if it was set when programming, this ROM cannot be read back, only reprogrammed completely.
@CyReVolt4 жыл бұрын
That is really sad. :( Well, also a challenge of course, but yea, really doesn't help in other situations.
@jhbonarius4 жыл бұрын
@@CyReVolt it helps a lot. Else competitors will copy your product.
@CyReVolt4 жыл бұрын
Yes, I would love that. :) Not sure in what regard it would help to keep others from contributing to development and finding improvements. Otherwise it's a problem for economy, education and the environment.
@jhbonarius4 жыл бұрын
@@CyReVolt that's not how it works. There might be some open source projects around, but they work with source code, not bit streams. Most of us need to pay our bills, thus need a salary. If the competition can just steal our work, without any effort, we'll have a problem.
@L20024 жыл бұрын
Nice Video :)
@artifactingreality4 жыл бұрын
this is too hard wtf. can you make one where you reverse engineer ms paint?
@seditt51464 жыл бұрын
In Vulkan it is your responsibility to handle pipeline barriers why exactly was the bug raised?
@capsuleone35433 жыл бұрын
Eii buddy, you should know how to access to the GPU in chromebooks.They don't provide you almost any information(even I don't knowthemodel), and less than that, modify in any way.Could you do a research about it, to see what's happening there? THANKS
@HritikV4 жыл бұрын
Can we get a video on cracking encryption with feistel structure?
@To-mos4 жыл бұрын
"Implemented a FPGA simulator in a shader to run it on a GPU." And here I am thinking cook-torrance brdf is impressive.
@usamaxwati46964 жыл бұрын
That's so kewl. ❤️
@lakmalsiriwardhana4 жыл бұрын
I know absolutely nothing. (2)
@IBMboy4 жыл бұрын
Reminds me of the ubershaders developed for the dolphin emulator
@RishankKumar4 жыл бұрын
This video messed up with the vibration motor inside mobile phone
@Cieric4 жыл бұрын
When he mentioned that it was something he wanted to be usable afterwards, I kinda expected to be able to find the project somewhere. It appears that the google CTF page has some sources but no link to anywhere the actual project is being maintained.
@idrivebugattiveyron4 жыл бұрын
They don't, on their github they have mentioned, it's like an unstable release and can't be trusted
@1e10014 жыл бұрын
yes
@idiotknobe86564 жыл бұрын
your description says LUA instead of Lua please don't do that besides that, great video as always
@roeesi-personal4 жыл бұрын
וואי איזה מלכים פסטן!
@cothan20624 жыл бұрын
From what I see, the author didn't really reverse his binary, from the author's perspective, it's easy to underestimate the difficulty of how complex the language became after the compilation step. However, the teams solved this challenge had insane skills.
@pengpleb4 жыл бұрын
My thoughts exactly, the guy just created some binaries using some custom code and went like: "ok, here you go, reverse them". The project itself looks really cool, but the "challenge design" was lazy.
@LiveOverflow4 жыл бұрын
I wholeheartedly disagree. He had a lot of thoughts on that reversing part, which he even talks about in this video. And also keep in mind that the challenge is play-tested before used in the competition. To test for the difficulty and if it is solvable. In this case Gynvael was the tester for it. So this is a very well designed challenge.
@9y0284 жыл бұрын
This guy literally sounds like Matt Parker.
@0xbyt3z4 жыл бұрын
I realize that after seeing your comment. He may be his son.
@abdarafi4 жыл бұрын
Maybe his relatives
@glxxyz4 жыл бұрын
This was autoplaying and I wondered what Michael Cera was talking about
@lunyxs70854 жыл бұрын
Hello, I am a new viewer to your channel and have watched some of your videos. I like your content; it was inspired me to start trying to learn assembly code. It also made me learn python and some other stuff. I would need your help^^, I wanted to try to learn assembly code, so since i couldn't get it i tried to crack an app that i needed. however, i started by looking at all the files. And, I found the source code in the files. So, since I have some experience with source code, I just modified the script. And now it doesn't launch anymore. I tried searching the checks on google but its been 2 weeks i've been trying for nothing and I still can't find what is causing this. I also have to say that the source code of the old ver works in the new ver etc, obvious. But I can't find the check that would make it work. The software's name is TimeBolt! If you could help me find what the check is, it'd be fantastic!
@sniff122plays4 жыл бұрын
any other i3wm users in the comments?
@KanalMcLP4 жыл бұрын
I think you could do better on the lighting in the introduction ;)
@viciaoxxx4 жыл бұрын
who's that guy 👀🍑🤸🏻♂️🍤📿
@g0w1h4m4 жыл бұрын
Time to get a haircut dude 😂
@VictorNascimentoo4 жыл бұрын
1 view
@rutikrojekar70944 жыл бұрын
First...Wasn't this early before😅
@superprocz4 жыл бұрын
2.
@nickadams23613 жыл бұрын
anything that is a pain in the ass python makes easy