Это видео недоступно.
Сожалеем об этом.

Deobfuscating Python Code (PicoCTF 2022 #30 'bloat.py')

Поделиться
HTML-код
  • Опубликовано: 26 апр 2022
  • Help the channel grow with a Like, Comment, & Subscribe!
    ❤️ Support ➡ j-h.io/patreon ↔ j-h.io/paypal ↔ j-h.io/buymeacoffee
    Check out the affiliates below for more free or discounted learning!
    🖥️ Zero-Point Security ➡ Certified Red Team Operator j-h.io/crto
    💻Zero-Point Security ➡ C2 Development with C# j-h.io/c2dev
    👨🏻‍💻7aSecurity ➡ Hacking Courses & Pentesting j-h.io/7asecurity
    📗Humble Bundle ➡ j-h.io/humblebundle
    🐶Snyk ➡ j-h.io/snyk
    🌎Follow me! ➡ j-h.io/discord ↔ j-h.io/twitter ↔ j-h.io/linkedin ↔ j-h.io/instagram ↔ j-h.io/tiktok
    📧Contact me! (I may be very slow to respond or completely unable to)
    🤝Sponsorship Inquiries ➡ j-h.io/sponsorship
    🚩 CTF Hosting Requests ➡ j-h.io/ctf
    🎤 Speaking Requests ➡ j-h.io/speaking
    💥 Malware Submission ➡ j-h.io/malware
    ❓ Everything Else ➡ j-h.io/etc

Комментарии • 42

  • @getellied
    @getellied 2 года назад +26

    I love how this challenge was easy to me just because of all your malware analysis vids

  • @MarsCorporations
    @MarsCorporations 2 года назад +89

    replacing characters is so basic, this should not even count as "obfuscated" 😅

    • @Icelink256
      @Icelink256 2 года назад +6

      Ciphers are incredibly common in cryptography, it's just that they're usually combined with multiple other methods to further obfuscate the data.
      NES games used bitshifting and XOR in their passwords, for example.
      With a simple substitution cipher, to show the player the resulting data in a human-readable way. So, it could be written down, for later.

  • @plut4580
    @plut4580 2 года назад +26

    great content John, this challenges are really great to learn every time something new. When a new malware-analysis video will come out?

  • @danhene6594
    @danhene6594 2 года назад +5

    Brilliant move using a python instance to translate, new to CTFs but I’ll be trying that in the future for sure

  • @QuickFixHicks914
    @QuickFixHicks914 2 года назад +3

    I love your content John you give me a new perspective on how to look at problems. Thank you.

    • @realitynowassigned
      @realitynowassigned 2 года назад +1

      Doesn't presume the viewer to be an idiot or a genius or fill the videos with fluff. It's hard to find anything like it. I learn more about python watching him dissect it in one video than anything else in several

  • @realitynowassigned
    @realitynowassigned 2 года назад +5

    Internet security is so broad that what is easy for 1000 is difficult for 1 and vice versa

  • @bladesvlogs4965
    @bladesvlogs4965 2 года назад

    You make it look so easy 👍

  • @lordspacecake5565
    @lordspacecake5565 2 года назад

    Great content!!

  • @pravinloke4000
    @pravinloke4000 9 месяцев назад

    Thanks for sharing...

  • @kris5187
    @kris5187 2 года назад

    Dude, your face structure deserves some chops, no cap xD
    Great content as always my dude

  • @MrKyubiSasuke
    @MrKyubiSasuke 2 года назад

    love the content

  • @whoami-so2hy
    @whoami-so2hy 2 года назад

    thanks for sharing

  • @sworatex1683
    @sworatex1683 8 месяцев назад

    This video looks like it will be scary to people that have never programmed but look absolutely easy for people with basic understanding

  • @viv_2489
    @viv_2489 2 года назад

    Too many great videos unleashed

  • @Majed_Babili
    @Majed_Babili 2 года назад

    🌷❤️ Great content

  • @tappineapple3381
    @tappineapple3381 2 года назад +1

    Btw there is more than just an xor happening in the decryption algorithm.

  • @Bowzerbro
    @Bowzerbro 2 года назад

    Lovely

  • @booruledie3052
    @booruledie3052 2 года назад

    Great

  • @mohitpannu27
    @mohitpannu27 2 года назад +3

    Sir… can we de-obfuscate python PyArmor

  • @prodigyprogrammer3187
    @prodigyprogrammer3187 2 года назад

    Cool

  • @rav04o2
    @rav04o2 2 года назад +3

    What is the purpose of the save and finish commands?

    • @DaniSpeh
      @DaniSpeh 2 года назад +6

      It's in one of the first picoctf videos. There was some easy challenge and time left so he created 2 scripts in bash. I think the save script saves the flag in flag.txt, if I remember correct , and finish adds _COMPLETED to the the directory name so you know the challenge is completed. You don't need those scripts to finish a challenge, they are his own quality-of-life scripts. But you'll learn some scripting watching this video

  • @ruthvikas
    @ruthvikas Год назад

    I was such a dumb guy, instead of python replacing all the strings what i did was print the index and value of that 'a' string and i manually found and replaced it.
    Such a dumb way to do it.

  • @flamendless
    @flamendless 2 года назад +1

    Cant just one run the obfuscated python file?

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Год назад

    Ki dra file using coffee to paste and coming for you code minchin attend I know I see it for you this file work is very easy

  • @REALMSB
    @REALMSB 2 года назад

    Niceeeeeeeeeee

  • @2Craft_
    @2Craft_ Год назад

    someone got this for pyarmor?

  • @guilherme5094
    @guilherme5094 2 года назад

    👍

  • @lingyong1111
    @lingyong1111 2 года назад +1

    Has Ed Sheeran changed his profession?

    • @andehhhhhhh
      @andehhhhhhh 2 года назад

      Music is just his side gig

  • @f1rem0th
    @f1rem0th 2 года назад +4

    A good video but your solution was way overkill. Could have just returned true in arg133() that had the obvious check in it.

  • @tom50586
    @tom50586 2 года назад +2

    bruh this isnt even obfuscation. I'd like to see you reverse a custom vm written in pure python

    • @xBosil
      @xBosil 2 года назад

      Bro i was scrolling through coments and didn't expect to find federal

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Год назад

    Red flags

  • @jasonbourne7950
    @jasonbourne7950 2 года назад

    But not view

  • @Holzf43ller
    @Holzf43ller 2 года назад

    It seems to me, that approximately 99.999% of the Python Code i get or see looks like the obfuscated CTF-File.
    And always this is just the pythonic way to do things.
    With loads of comments like "// get np for xxx" because everyone knows that np means numpy, right?
    Anyway.... i like Python as a Programming language... most programming styles of this language i strongly dislike.
    Also: nice video

  • @amirkiani2253
    @amirkiani2253 2 года назад

    First comment and like

  • @tacos7522
    @tacos7522 2 года назад

    i'm no coder lol but i've deobfuscated worse stuff haha.

  • @Matt-nx6uu
    @Matt-nx6uu 2 года назад

    Haha Python -_-

  • @ophello
    @ophello 2 года назад

    It’s “how do they look” or “what do they look like.” Not “how do they look like.” That’s an English mistake that foreigners make, and that now native English speakers are starting to become corrupted by.