Forensics Challenge Walkthroughs - DownUnderCTF (DUCTF) 2021

Поделиться
HTML-код
  • Опубликовано: 13 сен 2024

Комментарии • 30

  • @Restin_J_face
    @Restin_J_face 2 года назад +3

    Your videos are very calming. Felt de-stressed watching it

  • @soufianefariss
    @soufianefariss 3 года назад +6

    Love your content. Hopefully, you can do the reversing section

    • @_CryptoCat
      @_CryptoCat  3 года назад +2

      thanks mate 🥰 i wasnt planning on recording any more of these challs because CTFs are so regular (and all the official solutions are really good) but the challs in this CTF were very high quality, i might record some more at some stage 😊

  • @cryptoace8337
    @cryptoace8337 3 года назад +2

    beautiful as always.

  • @Ay89949
    @Ay89949 3 года назад +2

    Sir ur video is amazing....
    It's advance level.
    Thanks

  • @CoolFire666
    @CoolFire666 3 года назад +4

    For the morse code I had reasonable results with an ffmpeg band pass filter around 1kHz. (ffmpeg -i monorail.wav -af "bandpass=f=1000:w=100" output.wav)

    • @_CryptoCat
      @_CryptoCat  3 года назад

      awesome! will remember this one, ty 😊

    • @freeandeasy9795
      @freeandeasy9795 10 месяцев назад

      Do you still have the original .wav file. I downloaded from the web and its pulling up as a json file even though it has a .wav extension. Tried changing the hex, but no luck

  • @iamvikasgola
    @iamvikasgola 3 года назад +3

    Can you plz upload other challenge category videos too? Whenever you get time. Also, thanks for making these videos, as you seems to be only youtuber I found who makes most ctf solution videos.

    • @_CryptoCat
      @_CryptoCat  3 года назад +1

      i wish i had more time bro 😞 is there any particular challenge category you are interested in seeing videos for? i was thinking of picking a different category to focus on each CTF 😀

    • @iamvikasgola
      @iamvikasgola 3 года назад +1

      @@_CryptoCat yeah, I guess different category for every ctf works if you don't get time. Also, maybe you can reduce your work on some problems by referring to other videos which exist and are very similar to other ctf problem. Like walkthrough of standard buffer overflow can be done only once in a video and whenever you get this in ctfs, just mention this video in walkthrough.

    • @_CryptoCat
      @_CryptoCat  3 года назад +1

      @@iamvikasgola that's actually a great idea! i've done a lot of pwn vids which are similar, because i know new subscribers dont typically watch through old content (and hopefully my video making skills are improving on each vid) but in future if very similar challenges come up, i may link to previous video instead 🙂

  • @dr_tomato771
    @dr_tomato771 3 года назад +2

    Waiting for Web challenge Walkthrough xD .

    • @_CryptoCat
      @_CryptoCat  3 года назад +1

      no web video this week unfortunately. i just decided to pick a category for videos as it can be quite time consuming. you can find the full challenge source codes and writeups here though: github.com/DownUnderCTF/Challenges_2021_Public/tree/main/web 😉

  • @yashmehta7196
    @yashmehta7196 Год назад +1

    Amazing

  • @user-no9xi9xm8q
    @user-no9xi9xm8q 2 года назад +2

    For the pcap u could’ve just converted ductf to hex and grep

    • @_CryptoCat
      @_CryptoCat  2 года назад +1

      Yep! Something like this should work fine:
      grep -a 4455435446 notmyname.pcapng

  • @0xgodson119
    @0xgodson119 3 года назад +3

    once again nandri

  • @MMD-ob2tv
    @MMD-ob2tv 3 года назад +2

    1337 as usual ❤

  • @0xmoaz
    @0xmoaz 3 года назад +2

    hey cryptocat first comment

  • @ragnarlothbrok367
    @ragnarlothbrok367 3 года назад +3

    For this audio morse code shit, all you need to do is highpass up to that freq, then lowpass starting from that freq, and everything else is being cut out or diminished

    • @_CryptoCat
      @_CryptoCat  3 года назад +2

      thank you bro!! i guess something like this would work?
      ffmpeg -i input.mp4 -filter:a "highpass=f=980, lowpass=f=1050" output.mp4

    • @ragnarlothbrok367
      @ragnarlothbrok367 3 года назад +1

      @@_CryptoCat Looks good. Cheers!