Most of the time you get a video by an old pro that knows the answers, or somebody that edited it to appear better than they are. I personally learned far more watching you stumble your way to a solution and working through the logic. This is gold, and you earned yourself a subscriber! Keep 'em coming
@@mkevilempire John is a pro that knows the answers. However he walks through it in more depth than hitting F12 and saying "there it is! That's the vulnerable code". And then running the script he knows will exploit it and saying "there ya go". Some people are just born teachers. Tomnomnom is another person that I feel is a natural teacher. Some people got it some people don't.
As a total noob, that was incredible to watch. Seeing you work that out logically was so helpful in showing the type of thought process it takes. Thank you
@@neui6997 haha, I guess it came across differently - I am learning way more than I would have known, but some things are easier to pick up as a viewer and/or with a different perspective, so obviously there are those "why don't you try X" moments - but I probably wouldn't get to those places on my own (last time I actually worked on offensive security was 13 years ago, in which there is a six year period in which I didn't write a single line of code in any language before I got back to a more technical role now)
Thanks! I need to get into this! At the moment I'm a SOC analyst. I've ran into your articles on Huntress Security while reading about things while I'm solving/researching events! So thank you for that. :D
Super awesome! I really enjoy palling around with you on challenges. I'm learning a lot about the critical thinking of try, fail, try something else instead of getting bogged down in an endless loop of my own making. Thanks a bunch John!
Hey John, I'm a relatively new viewer (started getting your videos recommended a month ago). I wanted to share my thoughts on videos like this. For reference, I'm 27 and have delved into programming mostly as a hobby. I've never done anything like the challenges* you post about, but I'm absolutely enthralled by them I'm a SUPER huge fan of the kind of live, mostly-uncut reverse engineering you've been doing in this video and others. I feel that you're genuinely adding something to the huge wealth of content that's out there. Everything from the way you conduct yourself in the video, to the way you explain little details, to the way you spend time googling something real quick to figure something out, to your personality and sense of humility, is absolutely perfect. I have almost zero actual criticisms. You're extremely personable and I find it extremely easy to relate to you as a person in a video like this (as in, your train of thought is very similar to my own, and you end up having a lot of the same questions that I have). You're very good at explaining your thought process: it's always clear where you are and what you're doing, what you're about to do (mostly), and what you've done already, and it's very easy to follow and understand you. The live element is phenomenal, and I'm genuinely looking forward to future content from you. Thank you for taking the time to make these videos! * I'm talking about any of the live stuff you do. Challenges, malware analysis, etc. They're all gold.
The character messing up things wasn't the &,#,% or the others, it was the ' haha. You printed the message at the end of the loop so it threw the error before getting to the message (you can see the faulty char right before the exception at 27:49 when you print the char at the beginning of the loop). It does make sense too because you surround the char you're trying with single quotes. Anyway good video
I really like the fact that I could follow your thought process while unpacking each section of code. The video isn't edited to show less, it just jumped twice to what was already explained and bound to happen because the statement syntax was now correct. Thanks to my friend Machiavelli for recommending this video.
This was super freaking interesting. Blind injection is quite a weird one to me and couldn't wrap my head around some of the reading I've done, this opened my eyes to the possibilities of blind injection and what can be done, thank you very much
Great to watch someone being able to script this. :D I literally had to semi-brute the table and the flag using BurpSuite Intruder because I horribly suck at automating stuff like that. Took me 45 Minutes to get it done.
While watching this video, with my limited knowledge of sql injection I was wondering if it would be a lot easier to just stick a semicolon into that order by input to allow you to end that sql statement and start a new one, enabling you to put in whatever you want… but I did eventually realize the code running the sql query is outputting whatever is returned by the FIRST statement, so any sql you could run after that first statement would *probably* be useless if the end goal is to leak data. (however would still be useful if your end goal was to destroy data or something like that)
This was a fun problem. Solved it using the BurpSuite during the challenge... then got ashamed and went back and made a nice python script. Aliencamp was another fun emoji challenge :)
Gotta love the moment where I'm yelling "END....ENDD...END...it needs an END" at my screen. I know for a fact if someone were to record me coding there would be probably 5x as many instances of me freaking out over what went wrong when it's just some silly syntax error i forgot to copy from the documentation lmao.
Considering how the flags are structured he could check vowels first then constants by their commonality in words, but other then that you risk missing a character
Most of the time you get a video by an old pro that knows the answers, or somebody that edited it to appear better than they are. I personally learned far more watching you stumble your way to a solution and working through the logic. This is gold, and you earned yourself a subscriber! Keep 'em coming
Agree!!!
Could you point to one of those videos with some old pro who knows the answers? :)
@@mkevilempire John is a pro that knows the answers. However he walks through it in more depth than hitting F12 and saying "there it is! That's the vulnerable code". And then running the script he knows will exploit it and saying "there ya go". Some people are just born teachers. Tomnomnom is another person that I feel is a natural teacher. Some people got it some people don't.
Watching it gradually print out the flag was like watching a hacker scene in a movie :')
As a total noob, that was incredible to watch. Seeing you work that out logically was so helpful in showing the type of thought process it takes.
Thank you
Awesome video as always! :D
// TOOD: Replace all TODO's for TOOD
TOOD! 😀
Such a great video again! Despite me wanting to scream at you sometimes, but you noticed all of it on your own.
Well that’s pretentious
@@neui6997 haha, I guess it came across differently - I am learning way more than I would have known, but some things are easier to pick up as a viewer and/or with a different perspective, so obviously there are those "why don't you try X" moments - but I probably wouldn't get to those places on my own (last time I actually worked on offensive security was 13 years ago, in which there is a six year period in which I didn't write a single line of code in any language before I got back to a more technical role now)
I don't know about want to scream, some of us actually started shouting at the screen.
Thanks! I need to get into this! At the moment I'm a SOC analyst. I've ran into your articles on Huntress Security while reading about things while I'm solving/researching events! So thank you for that. :D
Super awesome! I really enjoy palling around with you on challenges. I'm learning a lot about the critical thinking of try, fail, try something else instead of getting bogged down in an endless loop of my own making. Thanks a bunch John!
This is like magic, didn't understand a single thing but enjoyed every second of it.
Hey John, I'm a relatively new viewer (started getting your videos recommended a month ago). I wanted to share my thoughts on videos like this. For reference, I'm 27 and have delved into programming mostly as a hobby. I've never done anything like the challenges* you post about, but I'm absolutely enthralled by them
I'm a SUPER huge fan of the kind of live, mostly-uncut reverse engineering you've been doing in this video and others. I feel that you're genuinely adding something to the huge wealth of content that's out there.
Everything from the way you conduct yourself in the video, to the way you explain little details, to the way you spend time googling something real quick to figure something out, to your personality and sense of humility, is absolutely perfect. I have almost zero actual criticisms. You're extremely personable and I find it extremely easy to relate to you as a person in a video like this (as in, your train of thought is very similar to my own, and you end up having a lot of the same questions that I have). You're very good at explaining your thought process: it's always clear where you are and what you're doing, what you're about to do (mostly), and what you've done already, and it's very easy to follow and understand you.
The live element is phenomenal, and I'm genuinely looking forward to future content from you. Thank you for taking the time to make these videos!
* I'm talking about any of the live stuff you do. Challenges, malware analysis, etc. They're all gold.
The character messing up things wasn't the &,#,% or the others, it was the ' haha. You printed the message at the end of the loop so it threw the error before getting to the message (you can see the faulty char right before the exception at 27:49 when you print the char at the beginning of the loop).
It does make sense too because you surround the char you're trying with single quotes.
Anyway good video
nice eye, I wouldn't have seen that without your comment. That attention to detail looks like a skill I would like =D
@@yovelspike haha thanks, gotta catch them bugs ;)
I really like the fact that I could follow your thought process while unpacking each section of code. The video isn't edited to show less, it just jumped twice to what was already explained and bound to happen because the statement syntax was now correct. Thanks to my friend Machiavelli for recommending this video.
good master..every video we learn.. nothing script kiddies..pure knowledges..thanks a lot for teaching us.
This was super freaking interesting. Blind injection is quite a weird one to me and couldn't wrap my head around some of the reading I've done, this opened my eyes to the possibilities of blind injection and what can be done, thank you very much
Wow! This is one of the most amazing videos that I've ever seen.
I was literaly shouting "END!" At the screen 😫
Glad to know I wasn't the only one. 🤣
He got there in the…. END
I learn a lot wtchig your videos, you're really good, i'm you're sub now, amazing work John!!
For anyone wondering the song at the end is fearless by lost sky. Also great video like everyone else I was screaming END
Great to watch someone being able to script this. :D I literally had to semi-brute the table and the flag using BurpSuite Intruder because I horribly suck at automating stuff like that. Took me 45 Minutes to get it done.
John makes every hard question human-doable :-). it was really fun. I really struggled at this one
Same here, I'm loving your channel so far✌
Lovely timing. Needed this after a stressful day! Great video
WOW that logic. also that gradually printing the flag amazed me. wow bro
Idk why but this was fun to watch. A lot of aha moments for me. Thanks man
Keep them coming these are great! Good job
Thank you John, very encouraging.
While watching this video, with my limited knowledge of sql injection I was wondering if it would be a lot easier to just stick a semicolon into that order by input to allow you to end that sql statement and start a new one, enabling you to put in whatever you want… but I did eventually realize the code running the sql query is outputting whatever is returned by the FIRST statement, so any sql you could run after that first statement would *probably* be useless if the end goal is to leak data. (however would still be useful if your end goal was to destroy data or something like that)
Nice video! Learned alot watching you
Definitely gives more knowledge than throwing it at sqlmap.
The END JOHN, the END!
That's what I figured out from the challenge...
Love these code review challenges
Hi John sir big fan new in your channel !
impressive
loving the vidz man
need look some more into blind sqli... but always a blast !
Man watching that flag coming thru almost was like magic ❤️
Thats cooooooool 🔥🔥
This was a fun problem. Solved it using the BurpSuite during the challenge... then got ashamed and went back and made a nice python script. Aliencamp was another fun emoji challenge :)
Gotta love the moment where I'm yelling "END....ENDD...END...it needs an END" at my screen. I know for a fact if someone were to record me coding there would be probably 5x as many instances of me freaking out over what went wrong when it's just some silly syntax error i forgot to copy from the documentation lmao.
Love this 👍
Very nice ...Dumps-Up!
Great video, but you should apply threading for the final part, much faster work
A MA ZI NG
as usual 👏🤣👌🏽👍🏿👏
I love your content bro.👍
Wouldn't using SQLmap be much faster?
Great video i had a good time. Thx
now it's time to learn how to make a blind injection with less requests 🙈 well done.
Considering how the flags are structured he could check vowels first then constants by their commonality in words, but other then that you risk missing a character
Hello sir your videos rellay helpfull for beginner
That was great, thank you so much!
That was dope!
Great video!!!
you're the man....
Your brain. Your damn brain. KUDOS!!!
Hi , we need a live session , also love from india
21:37, how long was the break? :) awesome work tho mister! really great stuff!
More Rick and Morty please! Oh wait, wrong guy
Great bro.
бРАВО, Маэстро!
Awesome !!
Wow bro this was cool
Good Luck bro
You are awesome
good video
so cool
😻
Awesome
you could have also done it with a time based subselect ;D
Push!
why does your sublime text instantly update to executable?
❤️
Where to learn ctf and htb
Where’s printable car in your python script used ???
How does python knows hay I should print only these char ???
Anyone tell me wht all the programming Lang I need to know for hack the box and anyone tell where to learn hacking
Cool
Hi Sir Help Me i want to know best book to learn reverse engineering from zero to advance..... Plzz help
Thanks
alocate object types to object class?🙂👻
i BLAME YOU for The Sleepless Nights, lol jpjp,watching ur videos lol
subtitle?
Hilson thapa Bernhardt
I NEED MALWARE VIDEOS
The END, John. THE END.
That's it, that's the comment.
Any biafran here?
in the real world you dont have all the code to look at
guy says hes a hacker expert doesnt even know case statements, damn must be pro walk thru then do the hack.... lol
Great video!!