FPGA simulated on a GPU - GPURTL Google CTF Finals 2019 (reversing)

  Рет қаралды 49,910

LiveOverflow

LiveOverflow

Күн бұрын

Пікірлер: 85
@j3r3miasmg
@j3r3miasmg 4 жыл бұрын
I feel represented every time he puts his hand to his forehead and laughs at how crazy this challenge is.
@viniciusalmeida7037
@viniciusalmeida7037 4 жыл бұрын
It's not everyday that you find your professor on the comment section of a random video.
@j3r3miasmg
@j3r3miasmg 4 жыл бұрын
@@viniciusalmeida7037 HAHAHAHA
@SauravKumar-tf3uv
@SauravKumar-tf3uv 4 жыл бұрын
It's always great to hear technical conversations :). You really should do it more
@fakhermokadem11
@fakhermokadem11 4 жыл бұрын
Should you have listen to Google CTF writers explain their thought train for 40minutes again? Heck yeah!
@fluffy_tail4365
@fluffy_tail4365 4 жыл бұрын
This challenge is nuts and I love how the code is public, is such a lovely implementation and actually pretty useful. Thanks for letting me discover it
@gecko4ever
@gecko4ever 4 жыл бұрын
Great interview, very interesting. Thanks for the detailled analysis and explanation together with Robin and Gynvael.
@nilp0inter2
@nilp0inter2 4 жыл бұрын
It was a very clever move to just use the round function of the feistel network to make the decryption function. Good thinking!
@uniquechannelnames
@uniquechannelnames 3 жыл бұрын
Oh yeeaaah totes clever move, couldnt believe how the round function of the feistel network made the decryption function... I feel so lacking in knowledge haha.I *barely* understood it.
@wuddadid
@wuddadid 4 жыл бұрын
I know absolutely nothing.
@nickadams2361
@nickadams2361 3 жыл бұрын
besides that.
@tuz2044
@tuz2044 4 жыл бұрын
Yes please! More of this :D
@pipony8939
@pipony8939 4 жыл бұрын
that's the last one /s
@CodePhiles
@CodePhiles 4 жыл бұрын
great interview , with intense of ideas !!, the approach of the team who solved it was great to get the function of the black box
@bigmistqke
@bigmistqke 4 жыл бұрын
Loving this serie!
@arunmagesh
@arunmagesh 4 жыл бұрын
damn! FPGA on gpu is something else. 😯😯😯
@mushenji
@mushenji 3 жыл бұрын
Very cool
@bluegizmo1983
@bluegizmo1983 4 жыл бұрын
Most of that went way over my head but I still loved it!
@lightb00k34
@lightb00k34 4 жыл бұрын
Make more videos of these format please 😍😍
@bhuvaneshs.k638
@bhuvaneshs.k638 3 жыл бұрын
This video is great.... Thankyou for this video
@CyReVolt
@CyReVolt 4 жыл бұрын
Mindblowing and decent - really cool, thank you! :)
@hadinossanosam4459
@hadinossanosam4459 3 жыл бұрын
watching this to procrastinate preparing for my VLSI I exam (Verilog, RTL, FPGA programming, HLS, ...) xD motivation is weird
@snooks5607
@snooks5607 3 жыл бұрын
impressive on many levels
@robinhood3841
@robinhood3841 4 жыл бұрын
I am really really curious to know how browser challenge exploitation was and how the teams manage to solve that challenge
@allthingsreversed
@allthingsreversed 4 жыл бұрын
2019 - the year when one could cough from (I guess) air conditioning while being closer than 2m from other person - good year ;) Also good video & interview! And indeed interesting chall. Please do more.
@natnaieleasrat9786
@natnaieleasrat9786 4 жыл бұрын
You're awesome!
@superhero1
@superhero1 4 жыл бұрын
Your content is awesome! Greetings
@dxdarrel8843
@dxdarrel8843 4 жыл бұрын
That Rust source code is actually difficult understand by itself, let alone reverse engineer the compiled binary.......
@rickyhan7023
@rickyhan7023 4 жыл бұрын
What an absolute Chad 🤣
@nickadams2361
@nickadams2361 3 жыл бұрын
jesus man what a boss
@devilmaycry1980
@devilmaycry1980 4 жыл бұрын
That was pretty cool :D
@movax20h
@movax20h 3 жыл бұрын
I just played a bit with it, extracted the shader, and they didn't even enabled size or speed optimisation, and left all debug information (like identifiers, function names, uninlined). Indeed disasembly using SPIRV-Cross was perfect. It recovered full source code back with variable names, and code structure intact. Doing a quick `spirv-opt --strip-debug -O` would really make things harder. But I guess, it is fine, just some fun, and limited time.
@rob6129
@rob6129 4 жыл бұрын
Very interesting
@SangharshSeth
@SangharshSeth 4 жыл бұрын
Great video. Please upload other challenges from gctf if possible.
@jhbonarius
@jhbonarius 4 жыл бұрын
Many commercial FPGAs encrypt their bitstream nowadays, to prevent reverse engineering
@allmycircuits8850
@allmycircuits8850 4 жыл бұрын
There are also FPGAs with embedded code ROM, so no code 'leaks' outside at all. Then there is 'security bit', if it was set when programming, this ROM cannot be read back, only reprogrammed completely.
@CyReVolt
@CyReVolt 4 жыл бұрын
That is really sad. :( Well, also a challenge of course, but yea, really doesn't help in other situations.
@jhbonarius
@jhbonarius 4 жыл бұрын
@@CyReVolt it helps a lot. Else competitors will copy your product.
@CyReVolt
@CyReVolt 4 жыл бұрын
Yes, I would love that. :) Not sure in what regard it would help to keep others from contributing to development and finding improvements. Otherwise it's a problem for economy, education and the environment.
@jhbonarius
@jhbonarius 4 жыл бұрын
@@CyReVolt that's not how it works. There might be some open source projects around, but they work with source code, not bit streams. Most of us need to pay our bills, thus need a salary. If the competition can just steal our work, without any effort, we'll have a problem.
@L2002
@L2002 4 жыл бұрын
Nice Video :)
@artifactingreality
@artifactingreality 4 жыл бұрын
this is too hard wtf. can you make one where you reverse engineer ms paint?
@seditt5146
@seditt5146 4 жыл бұрын
In Vulkan it is your responsibility to handle pipeline barriers why exactly was the bug raised?
@capsuleone3543
@capsuleone3543 3 жыл бұрын
Eii buddy, you should know how to access to the GPU in chromebooks.They don't provide you almost any information(even I don't knowthemodel), and less than that, modify in any way.Could you do a research about it, to see what's happening there? THANKS
@HritikV
@HritikV 4 жыл бұрын
Can we get a video on cracking encryption with feistel structure?
@To-mos
@To-mos 4 жыл бұрын
"Implemented a FPGA simulator in a shader to run it on a GPU." And here I am thinking cook-torrance brdf is impressive.
@usamaxwati4696
@usamaxwati4696 4 жыл бұрын
That's so kewl. ❤️
@lakmalsiriwardhana
@lakmalsiriwardhana 4 жыл бұрын
I know absolutely nothing. (2)
@IBMboy
@IBMboy 4 жыл бұрын
Reminds me of the ubershaders developed for the dolphin emulator
@RishankKumar
@RishankKumar 4 жыл бұрын
This video messed up with the vibration motor inside mobile phone
@Cieric
@Cieric 4 жыл бұрын
When he mentioned that it was something he wanted to be usable afterwards, I kinda expected to be able to find the project somewhere. It appears that the google CTF page has some sources but no link to anywhere the actual project is being maintained.
@idrivebugattiveyron
@idrivebugattiveyron 4 жыл бұрын
They don't, on their github they have mentioned, it's like an unstable release and can't be trusted
@1e1001
@1e1001 4 жыл бұрын
yes
@idiotknobe8656
@idiotknobe8656 4 жыл бұрын
your description says LUA instead of Lua please don't do that besides that, great video as always
@roeesi-personal
@roeesi-personal 4 жыл бұрын
וואי איזה מלכים פסטן!
@cothan2062
@cothan2062 4 жыл бұрын
From what I see, the author didn't really reverse his binary, from the author's perspective, it's easy to underestimate the difficulty of how complex the language became after the compilation step. However, the teams solved this challenge had insane skills.
@pengpleb
@pengpleb 4 жыл бұрын
My thoughts exactly, the guy just created some binaries using some custom code and went like: "ok, here you go, reverse them". The project itself looks really cool, but the "challenge design" was lazy.
@LiveOverflow
@LiveOverflow 4 жыл бұрын
I wholeheartedly disagree. He had a lot of thoughts on that reversing part, which he even talks about in this video. And also keep in mind that the challenge is play-tested before used in the competition. To test for the difficulty and if it is solvable. In this case Gynvael was the tester for it. So this is a very well designed challenge.
@9y028
@9y028 4 жыл бұрын
This guy literally sounds like Matt Parker.
@0xbyt3z
@0xbyt3z 4 жыл бұрын
I realize that after seeing your comment. He may be his son.
@abdarafi
@abdarafi 4 жыл бұрын
Maybe his relatives
@glxxyz
@glxxyz 4 жыл бұрын
This was autoplaying and I wondered what Michael Cera was talking about
@lunyxs7085
@lunyxs7085 4 жыл бұрын
Hello, I am a new viewer to your channel and have watched some of your videos. I like your content; it was inspired me to start trying to learn assembly code. It also made me learn python and some other stuff. I would need your help^^, I wanted to try to learn assembly code, so since i couldn't get it i tried to crack an app that i needed. however, i started by looking at all the files. And, I found the source code in the files. So, since I have some experience with source code, I just modified the script. And now it doesn't launch anymore. I tried searching the checks on google but its been 2 weeks i've been trying for nothing and I still can't find what is causing this. I also have to say that the source code of the old ver works in the new ver etc, obvious. But I can't find the check that would make it work. The software's name is TimeBolt! If you could help me find what the check is, it'd be fantastic!
@sniff122plays
@sniff122plays 4 жыл бұрын
any other i3wm users in the comments?
@KanalMcLP
@KanalMcLP 4 жыл бұрын
I think you could do better on the lighting in the introduction ;)
@viciaoxxx
@viciaoxxx 4 жыл бұрын
who's that guy 👀🍑🤸🏻‍♂️🍤📿
@g0w1h4m
@g0w1h4m 4 жыл бұрын
Time to get a haircut dude 😂
@VictorNascimentoo
@VictorNascimentoo 4 жыл бұрын
1 view
@rutikrojekar7094
@rutikrojekar7094 4 жыл бұрын
First...Wasn't this early before😅
@superprocz
@superprocz 4 жыл бұрын
2.
@nickadams2361
@nickadams2361 3 жыл бұрын
anything that is a pain in the ass python makes easy
@sha.68
@sha.68 4 жыл бұрын
First comment?
@satosiwu148
@satosiwu148 4 жыл бұрын
mission failed you'll get em next time
@sha.68
@sha.68 4 жыл бұрын
@@satosiwu148 🤕
XSS a Paste Service - Pasteurize (web) Google CTF 2020
11:46
LiveOverflow
Рет қаралды 65 М.
The Discovery of Zenbleed ft. Tavis Ormandy
19:43
LiveOverflow
Рет қаралды 61 М.
小丑妹妹插队被妈妈教训!#小丑#路飞#家庭#搞笑
00:12
家庭搞笑日记
Рет қаралды 36 МЛН
SHAPALAQ 6 серия / 3 часть #aminkavitaminka #aminak #aminokka #расулшоу
00:59
Аминка Витаминка
Рет қаралды 932 М.
Reading Kernel Source Code - Analysis of an Exploit
19:02
LiveOverflow
Рет қаралды 126 М.
Google CTF - BEGINNER Reverse Engineering w/ ANGR
39:47
John Hammond
Рет қаралды 284 М.
Patching Binaries (with vim, Binary Ninja, Ghidra and radare2)
21:00
Why Isn't Functional Programming the Norm? - Richard Feldman
46:09
Hacking Google Cloud?
21:59
LiveOverflow
Рет қаралды 124 М.
Kernel Root Exploit via a ptrace() and execve() Race Condition
15:23
Clean Code is SLOW But REQUIRED? | Prime Reacts
28:22
ThePrimeTime
Рет қаралды 306 М.
Reading Silicon: How to Reverse Engineer Integrated Circuits
31:52
Nintendo Hire me!!!!!!!!
16:52
LiveOverflow
Рет қаралды 673 М.
Zenbleed (CVE-2023-20593)
26:46
LiveOverflow
Рет қаралды 160 М.
小丑妹妹插队被妈妈教训!#小丑#路飞#家庭#搞笑
00:12
家庭搞笑日记
Рет қаралды 36 МЛН