USB Devices in Wireshark | PicoCTF 2017 [29] Just Keyp Trying

  Рет қаралды 25,593

John Hammond

John Hammond

Күн бұрын

Пікірлер: 16
@normalmendes
@normalmendes 6 жыл бұрын
The First byte of the leftover is a keyboard modifier. In the "-" and "[" packets the first byte was 0x20 representing the shift Key being pressed.
@zocker1600
@zocker1600 3 жыл бұрын
I know this video is old, but you helped me to write my first USB driver for Linux lol thanks a ton!
@waqarahmed4200
@waqarahmed4200 6 жыл бұрын
16:59 print on same line using .... print(mapping[special_byte],end='"')
@realNAKAMI
@realNAKAMI 6 жыл бұрын
17:07: go for 'mapping.get(special_byte)' instead of accessing it via square brackets. therefore you avoid the KeyError and get None if that key doesn't exist. 'print(none)' therefore works out.
@realNAKAMI
@realNAKAMI 6 жыл бұрын
to get rid of 'None' being printed (particularily annoying if you "".join) you can do 'print(EXPRESSION or "")' so it will just print empty string instead of literal 'None"
@nostalgeek2872
@nostalgeek2872 Жыл бұрын
Hello everyone ! Beginner user of our favorite software, to analyze USB communications, for practical reasons, I would like to know how to save the "payload" in the capture file, excluding the USB protocol layers (tokens, PID, handshake ... among other packaging data). Thanks for your help.
@raul3k11
@raul3k11 6 жыл бұрын
Yeah that 20:2D took some time to figure it out here too...I knew the 20 was shift, but forgot to replace the 20:2D to underscore lol
@mouseminer2978
@mouseminer2978 4 жыл бұрын
Great Video, I have a question. There is a software called WicReset for resetting the Epson printer's various errors. So whenever I have to use a particular option, I have to buy a key from random places with lots of risks of viruses for WicReset to function. Is it possible to sniff the USB connected to the printer while WicReset is doing its thing and capture the data and replay it to simulate the software. Thanks
@mediaskate648
@mediaskate648 6 жыл бұрын
When you were making the dictionary file you use cat and delimiters broken up by spaces to process the text. Where can I learn more about processing text like that?
@_JohnHammond
@_JohnHammond 6 жыл бұрын
Regular Expressions are an awesome text-processing tool, but not exactly the `grep` and `cut` style you saw in the command-line there. `sed` and `awk` are awesome for text processing, but I don't often break out of habit between using grep/cut/head/tail/rev in just clever ways. :P
@freezinater
@freezinater 6 жыл бұрын
I've been catching up on the series, but it seems part 28 is not currently published from what I can tell in the playlist. Was this one accidentally published instead of 28? I can tell this likely isn't a typo, since you have completed the Little School Bus challenge, which doesn't appear to have a video available.
@_JohnHammond
@_JohnHammond 6 жыл бұрын
Good call! Thanks for letting me know -- the playlist should be all corrected now. :P
@aarondinesh3657
@aarondinesh3657 5 жыл бұрын
Random Question, but what distribution of Linux are you using??
@Sandesh98147
@Sandesh98147 4 жыл бұрын
Ubuntu 16.04 xenial xerus if im not wrong.
@shrikantnikam2426
@shrikantnikam2426 4 жыл бұрын
Sir i have usb hid device that communicate with android app i want capture communication data and run independently without using android by using rpi or arduino? Is it possible?
@divinetiger9756
@divinetiger9756 4 жыл бұрын
I got a C in computer class, teach me senpai papi chulo
Pseudorandom Number Generators | PicoCTF [30] SoRandom
5:58
John Hammond
Рет қаралды 4,9 М.
Intro to Wireshark (PicoCTF 2022 #17 'packets-primer')
12:09
John Hammond
Рет қаралды 31 М.
Deadpool family by Tsuriki Show
00:12
Tsuriki Show
Рет қаралды 5 МЛН
I thought one thing and the truth is something else 😂
00:34
عائلة ابو رعد Abo Raad family
Рет қаралды 16 МЛН
USB in Wireshark: Stealing Credentials and Flags
11:05
Nate Singer
Рет қаралды 4,4 М.
28C3 - reverse engineering usb devices
26:03
HackersOnBoard
Рет қаралды 37 М.
PicoCTF 2019 [12] Shark On Wire 1
9:51
John Hammond
Рет қаралды 14 М.
PicoCTF 2017 [12] WorldChat (GREP & cut)
10:12
John Hammond
Рет қаралды 7 М.
Wireshark Decrypting SSL | "Ssleepy" TJCTF 2018
8:44
John Hammond
Рет қаралды 20 М.
Reverse Engineering a USB Device (Element14)
19:50
Amy Worrall
Рет қаралды 7 М.
SVG Internals (PicoCTF 2022 #07 enhance)
9:09
John Hammond
Рет қаралды 35 М.
Audio Spectrogram & StegCracker Passwords - DownUnderCTF
23:32
John Hammond
Рет қаралды 55 М.
PicoCTF 2017 [22] Digital Camouflage
11:43
John Hammond
Рет қаралды 8 М.
Deadpool family by Tsuriki Show
00:12
Tsuriki Show
Рет қаралды 5 МЛН