Exploiting C strstr Function (PicoCTF 2022 #37 'rps')

  Рет қаралды 13,090

John Hammond

John Hammond

Күн бұрын

Пікірлер: 17
@thetrollingboss3155
@thetrollingboss3155 2 жыл бұрын
Wow, that's amazing! I did not even realize the strstr function was vulnerable during the competition and ended up doing some good 'ol PRNG abuse
@0xTas
@0xTas 2 жыл бұрын
That was a fun little exercise in reversing a program's logic, nice video.
@majoryoshi
@majoryoshi 2 жыл бұрын
The only proper way to win at RPS. I know these are designed to be easier but holy cow this made me laugh so hard at how stupid the answer was
@Lodinn
@Lodinn 2 жыл бұрын
Tbf given a win is possible playing "normally" one might as well just brute force it.
@kawzaki
@kawzaki 2 жыл бұрын
The moment I saw strstr I guessed put all of them in as one word. Funny! Then funny how the flag reads some extreme luck ! Hahaha
@noideawhatever
@noideawhatever Жыл бұрын
I searched what is strstr and figured the loophole out right away :D
@bhagyalakshmi1053
@bhagyalakshmi1053 Жыл бұрын
Ok full pics and videos season.
@djibrille31
@djibrille31 2 жыл бұрын
Why does he use the ? sign in the grep command regular expression? Is it not enough to just use the ".*" like grep -oE "picoCTF{.*}". It drives me mad that I do not get it.
@Lodinn
@Lodinn 2 жыл бұрын
If the output contains another closing bracket, greedy capture would get the entirety of it. Not necessary here, but it's a good habit to have when dealing with regex matching something in brackets.
@lucidattf
@lucidattf 2 жыл бұрын
if the text content for example included picoCTF{aaaaa}aaaaa and then another }, the grep without the question mark would output "picoCTF{aaaaa}aaaaa and then another }"
@mrhappytroll
@mrhappytroll 2 жыл бұрын
Im proud of myself for figuring this out just by pausing and looking at the source code haha
@bladesvlogs4965
@bladesvlogs4965 2 жыл бұрын
Would never have gotten that one 🤪
@AmanPatel-rv2it
@AmanPatel-rv2it 2 жыл бұрын
That's nice - just strstr being my cousin 😂😂
@lordspacecake5565
@lordspacecake5565 2 жыл бұрын
Very neat trick
@vanfrancisco4573
@vanfrancisco4573 2 жыл бұрын
Lmao, i have been tinkering the program only not to notice that the category was not a reverse engineering problem but a binary exploitation problem. stupid me. LOL
@jeffer746
@jeffer746 2 жыл бұрын
i just spammed the program with paper 5000 times until it won lol
@unutilisateurdeyoutube1256
@unutilisateurdeyoutube1256 2 жыл бұрын
you spam five times rockpaperscissors and it wins xd
How to Crack Software (Reverse Engineering)
16:16
Eric Parker
Рет қаралды 828 М.
黑天使只对C罗有感觉#short #angel #clown
00:39
Super Beauty team
Рет қаралды 36 МЛН
Support each other🤝
00:31
ISSEI / いっせい
Рет қаралды 81 МЛН
Return Oriented Programming (PicoCTF 2022 #48 'ropfu')
35:09
John Hammond
Рет қаралды 23 М.
why are switch statements so HECKIN fast?
11:03
Low Level
Рет қаралды 437 М.
Format String printf Vulnerabilities (PicoCTF 2022 #46 'flag-leak')
19:44
Learning C# In A Week... Otherwise I Fail University
9:04
GHIDRA for Reverse Engineering (PicoCTF 2022 #42 'bbbloat')
17:44
John Hammond
Рет қаралды 226 М.
how do hackers exploit buffers that are too small?
8:25
Low Level
Рет қаралды 206 М.
Intro to the Zig Programming Language • Andrew Kelley • GOTO 2022
50:14
Obscure File Types & Compression (PicoCTF 2022 #10 'file-types')
17:06