GuyInTheShell
GuyInTheShell
  • Видео 15
  • Просмотров 11 894
WriteUp - Offshift 2021 - staple AES
# References
www.offshift.io
ctfd.offshift.io/
Просмотров: 180

Видео

WriteUp - Offshift 2021 - SanityCheck
Просмотров 533 года назад
# References www.offshift.io ctfd.offshift.io/ etherscan.io/ en.wikipedia.org/wiki/Solidity
WriteUp - Offshift 2021 - Graphed 2.0
Просмотров 843 года назад
# References www.offshift.io ctfd.offshift.io/ github.com/swisskyrepo/PayloadsAllTheThings guyintheshell.github.io/CTF/kb/graphql.html
WriteUp - Offshift 2021 - Maze
Просмотров 723 года назад
# References www.offshift.io ctfd.offshift.io/ github.com/swisskyrepo/PayloadsAllTheThings guyintheshell.github.io/CTF/kb/server_side_template_injection.html
WriteUp - Offshift 2021 - Pyjail
Просмотров 7003 года назад
# References www.offshift.io ctfd.offshift.io/
Encrypting/Encoding/Hashing
Просмотров 473 года назад
In this video, we'll cover the difference and the usage of those 3 different data transformation techniques # References JPEG: en.wikipedia.org/wiki/JPEG Encoding: en.wikipedia.org/wiki/Code Encryption: en.wikipedia.org/wiki/Encryption Hashing: en.wikipedia.org/wiki/Hash_function MD5 collision: natmchugh.blogspot.com/2015/02/create-your-own-md5-collisions.html
CTF - Image Forensics 101
Просмотров 10 тыс.3 года назад
In which we'll discuss how we can hide data in a JPEG files. This is very introductory and we'll find some data that is not really well hidden, but we'll talk about some tools in the process that are helpful to work on CTF challenges # References JPEG wikipedia: en.wikipedia.org/wiki/JPEG EXIF wikipedia: en.wikipedia.org/wiki/EXIF
THM PickleRick
Просмотров 1203 года назад
This is a writeup of the Pickle Rick challenge that can be found on the TryHackMe platform. It's an reasonably easy web and linux challenge It's a writeup, so as usual, I recommend that you first try it yourself before watching the video solution. Flags are hidden Challenge tryhackme.com/room/picklerick Thumbnail from commons.wikimedia.org/wiki/File:Wondercon_2016_-_Rick_and_Morty_Cosplay_(2598...
WhatAreCTFs
Просмотров 683 года назад
Quick introduction to what CTF is before we talk about them on this channel # Thanks Ascii Art from www.asciiart.eu/ My thanks to - Joan G. Stark - Henry Segerman - n4biS # References CTFlearn: ctflearn.com/ TryHackMe: tryhackme.com/ Exploit Education: exploit.education/ Hacker101: ctf.hacker101.com/ Pwny Island: www.pwnadventure.com/ CTFtime: ctftime.org/
Negative Numbers
Просмотров 93 года назад
Let's discover how negative integers are represented in binary # References Java documentation: docs.oracle.com/javase/tutorial/java/nutsandbolts/datatypes.html
Introduction to assembly code
Просмотров 613 года назад
This video is an introduction to the assembly language. The reason I'm doing that is not that I want to be able to write assembly code myself, that is too cumbersome, but rather that I want to have enough understanding to be able to do CTF, that is to say Capture The Flag challenges, that involve Reverse Engineering a binary program. Today, we'll see how to write a hello world program in assemb...
Introduction To Assembly - Bonus MacOS
Просмотров 3253 года назад
Bonus video following the introduction to Assembly code video. We'll do the same program but on the MacOS operating system # References MacOS syscall function numbers: opensource.apple.com/source/xnu/xnu-1504.3.12/bsd/kern/syscalls.master
Introduction To Assembly - Bonus AT&T
Просмотров 913 года назад
Bonus video following the Introduction to Assembly code video. We'll do the same program but with the AT&T syntax
Understanding binary
Просмотров 173 года назад
This is an introduction video to the binary notation We'll see how binary works, how to decode a binary number to decimal, what is the ASCII table, and how we can use python to play with those concepts
Hexadecimal notation
Просмотров 363 года назад
This video continues what we started in "understanding binary" and adds to it the hexadecimal notation, showing what it is and how it can be useful

Комментарии

  • @user-sl3gr6dl9r
    @user-sl3gr6dl9r 10 месяцев назад

    Thank you sir... thank you so much

  • @lancemarchetti8673
    @lancemarchetti8673 Год назад

    Thanks for the video. I recently started testing an idea for CTFs by embedding a jpg inside another jpg without stegonograhy tools that incorporate lsb, msb encryption etc. Image quality is not affected and no passwords are necessary. I'm very excited about my progress so far because I have not yet seen this technique used anywhere so far.

  • @mohamedahmedmahoud9327
    @mohamedahmedmahoud9327 Год назад

    when you give the certificate to someone deserve it

  • @whitefps2603
    @whitefps2603 2 года назад

    Hi @GuyInTheShell thanks for this video really heplful

  • @_SmiIe_
    @_SmiIe_ 2 года назад

    This was a perfect starter guide, many thanks!

  • @expert2570
    @expert2570 2 года назад

    Nice! by the way the arabic word is Flag in english ::)

  • @expert2570
    @expert2570 2 года назад

    Excellent tutorial man thank you this really helps!

  • @universalponcho
    @universalponcho 2 года назад

    This is good. Very good

  • @k0imet_
    @k0imet_ 3 года назад

    great work ...

  • @sahvtft
    @sahvtft 3 года назад

    This is so cool

    • @guyintheshell6788
      @guyintheshell6788 3 года назад

      :)

    • @sahvtft
      @sahvtft 3 года назад

      @@guyintheshell6788 what is your opinion on the xft project as a whole?

    • @guyintheshell6788
      @guyintheshell6788 3 года назад

      @@sahvtft Well that was my second CTF ever so it's hard to have an opinion. I guess there were quite a few accessible challenges which I liked. They had quite a bit of instability but I think it was in part due to a lot of people mis-behaving, so it's hard to blame them. It was also their first. I'm sure they learned a lot from it

    • @guyintheshell6788
      @guyintheshell6788 3 года назад

      and if you mean the XFT product / company, i.e smart contract, ... I have no opinion

  • @guillaumebouchard5109
    @guillaumebouchard5109 3 года назад

    First!