Reverse Engineering Loops - "Syncopation" HackTheBox Business CTF

  Рет қаралды 38,925

John Hammond

John Hammond

Күн бұрын

If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer smart completions and documentation. www.kite.com/get-kite/?... (disclaimer, affiliate link)
For more content, subscribe on Twitch! / johnhammond010
If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
PayPal: paypal.me/johnhammond010
E-mail: johnhammond010@gmail.com
Discord: johnhammond.org/discord
Twitter: / _johnhammond
GitHub: github.com/JohnHammond

Пікірлер: 58
@JCtheMusicMan_
@JCtheMusicMan_ 2 жыл бұрын
This makes me cry 😢 I have no idea how you knew which values to copy from Ghidra and how you knew to take every 5th value and piece it together. This is beyond mind blowing because it went so far over my head I didn’t know what I was looking at. Very impressive that you have a deep enough understanding to be able to fly through these so fast.
@gloop1984
@gloop1984 2 жыл бұрын
It’s written in the code on 6:11
@jkobain
@jkobain 2 жыл бұрын
Ghidra does not reconstruct what's written originally (names of constants, internal functions, and variables), but it disassembles (ie, recreates) what the original code does. Thus, you can see what it performs. So yes, it's written (and referenced!) in the code, you probably just need to watch that fragment again with this knowledge.
@JCtheMusicMan_
@JCtheMusicMan_ 2 жыл бұрын
@@gloop1984 That’s what I get for watching on my phone. 🤦‍♂️ I took a screenshot to see what he was talking about and he literally said it out loud. Thanks for pointing it out.
@aurinator
@aurinator Ай бұрын
This one really stood out to me because it's the first time I've heard the word "Syncopation" outside of music production.
@juld-ck4ps
@juld-ck4ps 2 жыл бұрын
Really enjoy this hackthebox ctf series, keep it up!!
@bobcooke90
@bobcooke90 2 жыл бұрын
Awesome! You're a beast John!
@JCtheMusicMan_
@JCtheMusicMan_ 2 жыл бұрын
Always love your content!
@rameezrehman92
@rameezrehman92 2 жыл бұрын
Hey... Thanks for the walkthrough. I am a noob. In the CTF, I didn't dive deep enough into the functions to understand what they were doing. I just browsed through the code and didn't find the flag and left. :-D Now I have a slightly better perspective on what (and how) to look for the things in ghidra.
@algerienizer
@algerienizer 2 жыл бұрын
this was definitely useful and enjoyable!
@aashwinsharma1607
@aashwinsharma1607 2 жыл бұрын
Oh i Literally Loved it Sooo Much!!! Big Fan of yours
@bech2342
@bech2342 2 жыл бұрын
if you set it as char array with the right size, it would be show as string in ghidra
@jkobain
@jkobain 2 жыл бұрын
Yes, Least Significant Bit, Least Significant Byte. And Linux Standard Base too…
@olympiawa
@olympiawa 2 жыл бұрын
I have a very long way to go before I could begin to figure out a "simple" CTF. This would take me years.
@ryd3v
@ryd3v 2 жыл бұрын
Excellent
@bakor111
@bakor111 2 жыл бұрын
I enjoy 10 minutes and the challange I can Understand
@ritwikpradhan8370
@ritwikpradhan8370 2 жыл бұрын
Awesome 💥
@bezdna7366
@bezdna7366 2 жыл бұрын
amazing!
@adminuser41
@adminuser41 2 жыл бұрын
wow i still have a lot to learn
@jakemuff9407
@jakemuff9407 2 жыл бұрын
Interesting binary, what would happen if instead of every 5th entry it was a random number between 0 and 10 set off a certain seed? To solve you would then have to take the seed originally used to get the entries used in the flag
@Karthikeya_patnala
@Karthikeya_patnala 2 жыл бұрын
John The Ripper
@juneilquilana5159
@juneilquilana5159 2 жыл бұрын
Wow. Great👍👏👏
@mrmarker98
@mrmarker98 2 жыл бұрын
Pog.
@hexadecimalhexadecimal5241
@hexadecimalhexadecimal5241 2 жыл бұрын
Dude read my comment last stream, and decided to make a video on Ghidra FUCK YEAH!! booting up and following
@fadhilsaheer8877
@fadhilsaheer8877 2 жыл бұрын
"I hate my life" - John Hammond 2021 (Finding preferences )
@TheCximus
@TheCximus 2 жыл бұрын
I think that's what most people want to see... How did you install ghidra) and not how do you use it)
@Urugian
@Urugian 2 жыл бұрын
WoW i love you video
@cocosloan3748
@cocosloan3748 2 жыл бұрын
Amazing ... And pls dont hate your life - Enjoy it !
@ma24th
@ma24th Жыл бұрын
print(chr(data[i], end="") end varable use for new line
@UmbraAtrox_
@UmbraAtrox_ 2 жыл бұрын
heyo, i got this pic18 hex i want to dissect, i disassembled it into asm but I can't read assembly, is there a tool which can visualize the program? by visualize i mean a view like the gihdra program tree so i can learn to reverse smaller blocks since the whole thing is a bit much at once for my smallbrain. Help?
@p0fs
@p0fs 2 жыл бұрын
There’s Copy Special - Byte String, just that you know 😂
@nirmitshah7660
@nirmitshah7660 2 жыл бұрын
Hey p0fs?
@p0fs
@p0fs 2 жыл бұрын
@@nirmitshah7660 yup )
@johtodev
@johtodev 2 жыл бұрын
have you tried ghidra version 10? (apparently some sort of debugger added) Would love to see how you would use it.
@coder_rc
@coder_rc 2 жыл бұрын
The debugger sucks.
@johtodev
@johtodev 2 жыл бұрын
@@coder_rc 😥 well dang
@JP-wu1gi
@JP-wu1gi 2 жыл бұрын
epico
@Heathmcdonald
@Heathmcdonald 2 жыл бұрын
Slap the like!
@_vicary
@_vicary 2 жыл бұрын
Ghee-dra or G-Hydra?
@vaisakhkm783
@vaisakhkm783 2 жыл бұрын
Hey go and sleep,your face seems like you didn't took a rest for a while... Great videos.....
@bruddaman32491
@bruddaman32491 2 жыл бұрын
How hard is the OSCP cert compared to Hack the box machines?
@Lacsap3366
@Lacsap3366 2 жыл бұрын
From what I've heard htb machines are more difficult. Are you planning ok taking the OSCP soon?
@bruddaman32491
@bruddaman32491 2 жыл бұрын
@@Lacsap3366 yea in a couple of months once I get my diploma
@Lacsap3366
@Lacsap3366 2 жыл бұрын
@@bruddaman32491 i am also close to getting my bachelor's degree
@custume
@custume 2 жыл бұрын
nice crack
@Zc4sh
@Zc4sh 2 жыл бұрын
How to write report
@hackingismylife2167
@hackingismylife2167 2 жыл бұрын
I need a help
@lefteriseleftheriades7381
@lefteriseleftheriades7381 2 жыл бұрын
Use ghidra refactor the code. Use the tool properly. REFACTOR
@Daniel-yp6mm
@Daniel-yp6mm 2 жыл бұрын
4th wee wooo pog
@petrovasyka8
@petrovasyka8 2 жыл бұрын
What?
@CristiNeagu
@CristiNeagu 2 жыл бұрын
9:18 Well, either buy Sublime (since you are using it professionally in some capacity) or use VS Code or VS Codium, which are perfectly free to use.
@cloud_cluster
@cloud_cluster 2 жыл бұрын
how dare you
@CristiNeagu
@CristiNeagu 2 жыл бұрын
@@cloud_cluster Easy there, Greta.
@Uerdue
@Uerdue Жыл бұрын
Nah, he should've used vim there.
@DJStompZone
@DJStompZone 2 ай бұрын
Man. You open Ghidra in almost every single CTF video. And EVERY SINGLE TIME, you fumble around looking for the text zoom, and on the occasions where you end up actually finding it before giving up, you never show where the option even is! Frustrating to watch on several different levels. I know this is a petty complaint but c'mon man, write it down or something. This is your instrument, get to know it a bit before you play a concert on it.
@nullpointer4200
@nullpointer4200 2 жыл бұрын
Huh, your level of reversing like a newbie, it’s looks like a joke when you solving this simple tasks
@manticore4952
@manticore4952 2 жыл бұрын
Offer an improvement, don't just critique for the sake of criticism.
Become a Certified Penetration Tester with HackTheBox CPTS!
16:25
John Hammond
Рет қаралды 98 М.
BAD RANSOMWARE - HackTheBox Business CTF
22:01
John Hammond
Рет қаралды 52 М.
Let's all try it too‼︎#magic#tenge
00:26
Nonomen ノノメン
Рет қаралды 48 МЛН
Uma Ki Super Power To Dekho 😂
00:15
Uma Bai
Рет қаралды 42 МЛН
Зу-зу Күлпәш. Стоп. (1-бөлім)
52:33
ASTANATV Movie
Рет қаралды 875 М.
didn't want to let me in #tiktok
00:20
Анастасия Тарасова
Рет қаралды 10 МЛН
Laravel CVE / PHP Deserialization - "Larablog" HTB Business CTF
34:34
Ghidra Emulator | New Tool in 10.3!
13:34
stryker2k2
Рет қаралды 6 М.
Reverse Engineering RollerCoaster Tycoon | How does it work?
38:54
Nathan Baggs
Рет қаралды 222 М.
Reverse Engineering w/GDB and Ghidra! | picoCTF 2022 #08 "Keygenme"
22:37
everything is open source if you can reverse engineer (try it RIGHT NOW!)
13:56
Low Level Learning
Рет қаралды 1,2 МЛН
Finding WEIRD Devices on the Public Internet
27:48
John Hammond
Рет қаралды 170 М.
HackTheBox "Business CTF" - Time - Command Injection
16:02
John Hammond
Рет қаралды 34 М.
JSON Web Keys (JWK & JWT) - "Emergency" - HackTheBox Business CTF
29:09
Let's all try it too‼︎#magic#tenge
00:26
Nonomen ノノメン
Рет қаралды 48 МЛН