Another awesome video dude! Really great "writeup" of all the challenges!
@_CryptoCat2 жыл бұрын
🙏🥰
@migo3692 жыл бұрын
Awesome man! Really enjoy your videos, keep it up.
@_CryptoCat2 жыл бұрын
thanks mate 💜
@ca79862 жыл бұрын
Amazing walkthrough
@_CryptoCat2 жыл бұрын
ty 🙏🥰
@jonathanhoyos81912 жыл бұрын
I did enjoy. Keep posting more interesting CTF-Web challenges solutions :D
@_CryptoCat2 жыл бұрын
thanks mate 🙏🥰
@khalilbouzidi84322 жыл бұрын
Thank you for sharing very informative, hope to see some buffer overflows
@_CryptoCat2 жыл бұрын
Thanks mate 🥰 No pwn challs from this CTF but there's *a lot* already on the channel 😉
@khalilbouzidi84322 жыл бұрын
@CryptoCat yes already did watch them (good content === new subscriber :D), i did know this channel when i was trying to do babysteps challenge, still couldn't solve it 🙃
@_CryptoCat2 жыл бұрын
@@khalilbouzidi8432 there was a few ways to solve babysteps, i just used ret2libc which comes up a lot in CTFs although this was 32-bit, which is less common: github.com/Crypto-Cat/CTF/blob/main/ctf_events/nahamcon_22/pwn/babysteps.py
@khalilbouzidi84322 жыл бұрын
@@_CryptoCat I'm trying to learn more about pwn so thanks for the guidance
@sahilpawar51522 жыл бұрын
Man I had seen a challenge similar to the last one in some CTF but I couldn't solve it and weeks later, I forgot name of the CTF so I couldn't search for its writeup 😅. But now I found challenge similar to it. Thanks man really appreciate your efforts ❤️.
@_CryptoCat2 жыл бұрын
thank you 🙏🥰
@SuperSohaizai2 жыл бұрын
Just when I want to search for write ups, I found this. Perfect timing. Couldn't join the event at that time so will make use of this, thanks! Edit: was going to try dirbuster of some sort, but it is not allowed apparently, at least according to the rules
@_CryptoCat2 жыл бұрын
Yeh, that's typically the case with CTFs, no automated tools. They normally say that due to the infrastructure though. I think it makes a lot less sense as a rule when each player has their own instance. I guess the challenges are designed to be solved without brute force though 😅
@SuperSohaizai2 жыл бұрын
@@_CryptoCat yeah I agree with that part. Brute forcing kinda take the beauty out of it to be honest, even though it does make it harder. Not gonna lie, dirb was always on my mind when I was attempting, and have to keep reminding myself haha. Thanks again for the video!
@_CryptoCat2 жыл бұрын
@@SuperSohaizai It really wasn't needed here, I just thought I'd include it in because it's one of the first things you'd do on a HTB machine, or in a real pentest. Knowing my luck people will do in CTF events now and get suspended for breaking rules: "😮 but I learnt it from CryptoCat?!" 🤣 Thank you! 🙏🥰
@jorgevilla65232 жыл бұрын
great video thanks
@_CryptoCat2 жыл бұрын
💜
@nuridincersaygili2 жыл бұрын
excellent! anything for babyrsa?
@_CryptoCat2 жыл бұрын
nope! i normally avoid crypto 😁
@vancaotran75472 жыл бұрын
when will you have the pwnable video of nahamcon CTF ? I'm really looking forward to it
@_CryptoCat2 жыл бұрын
never 😆 it was a great CTF but I don't have time to cover all challenges, especially when there's multiple competitions every week. I typically either: a) pick a category b) solve easy-ish challs from multiple category c) pick 1-2 hard challenges angstrom CTF video is coming later today though, containing a few pwn challs 😉
@BaNguyen-xt9bg2 жыл бұрын
I wait for pwn sir!
@_CryptoCat2 жыл бұрын
No pwn this time! I solved a couple of the easier ones but they were very similar to videos I've made before.
@sudoer922 жыл бұрын
Nice video i learned alot, did you win the ctf ?
@_CryptoCat2 жыл бұрын
thanks mate 🥰 i definitely didnt win haha, just did a few challenges 😁
@0xgodson1192 жыл бұрын
🤩
@_CryptoCat2 жыл бұрын
nandri 🙏🥰
@rehanmumtaz59722 жыл бұрын
Can u share the presentation link?
@_CryptoCat2 жыл бұрын
From the conference? Which presentation? I think they'll be uploaded to kzbin.info
@rehanmumtaz59722 жыл бұрын
@@_CryptoCat i think you open the presentation while solving hacker T's challenge... may be its of defcon i guess
@_CryptoCat2 жыл бұрын
@@rehanmumtaz5972 oooooo I know what you mean! here it is: docs.google.com/presentation/d/1JdIjHHPsFSgLbaJcHmMkE904jmwPM4xdhEuwhy2ebvo/htmlpresent
@rehanmumtaz59722 жыл бұрын
@@_CryptoCat Thanks for sharing btw great explanation of these web challenges ! 💓
@_CryptoCat2 жыл бұрын
@@rehanmumtaz5972 💜
@kaizensky33992 жыл бұрын
Did you forget to add Deafcon?
@_CryptoCat2 жыл бұрын
nah haha a teammate solved it and i didn't have all that much time. I was just going to pick 1 hard chall.. then couldn't solve any and did a few web instead 😂 I struggled enough with some of the xss ones bc im a n00b 😆
@seif-allahhomrani21692 жыл бұрын
@@_CryptoCat it's cool that u mention ur failures and ur successes bro !!
@tlouik2 жыл бұрын
@@_CryptoCat no, you're pro D:
@IlmuGuru2 жыл бұрын
Auto subscribe , dont take down this vidio
@_CryptoCat2 жыл бұрын
ty 🥰 i wasn't planning to take down the video but youtube censors be warned!! 😀
@IlmuGuru2 жыл бұрын
@@_CryptoCat Calm down I've saved it in the gallery🤣
@MrFontaineInc2 жыл бұрын
I definitely need to brush up on Regex. Personnel stumped me and it was so simple.
@_CryptoCat2 жыл бұрын
that one was cool! don't see it much in ctfs 😊
@nogoodhacker69442 жыл бұрын
how were you able to guess the flag would be at /var/www/flag.txt on extravagant xml injection 6:12 ?? BTW awesome !
@_CryptoCat2 жыл бұрын
thanks 🥰 3:19 it said the flag was at /var/www so just had to guess filename, either "flag" or "flag.txt" 😁