NahamCon CTF 2023: Web Challenge Walkthroughs

Поделиться
HTML-код
  • Опубликовано: 28 авг 2024

Комментарии • 47

  • @juliogallo7694
    @juliogallo7694 Год назад +4

    Great videos as always. One of the top content creators in this domain. I hope this is sustainable for you because I know how much work goes into all this while still having a job + keeping up to date with new techniques + personal. Take care of yourself! Best wishes

    • @_CryptoCat
      @_CryptoCat  Год назад +1

      Thanks mate, appreciate that! It's definitely harder to keep up with content creation on my personal channel now, since it's my day job 😁 That's my main reason for participating in less these days. Also, if I do make videos I try to stick to a single CTF category to prevent burnout 🤞

  • @damnqais4478
    @damnqais4478 Год назад +6

    great writeups, for Obligatory i did |{{config}}| and got the flask session secret and changed the id from 2 to 1 (admin) and got the flag in the to do list :)

    • @_CryptoCat
      @_CryptoCat  Год назад

      That's a great solution, love it! 🔥

  • @f0rty7even9
    @f0rty7even9 Год назад +4

    thanks for these videos. really helpful and well explained. keep doing what u're doing! much love

  • @LearnTermux
    @LearnTermux Год назад +3

    Damn I was looking for it. Thanks sir.

  • @kartibok001
    @kartibok001 Год назад +3

    Great work - and thanks for the ngrok - never seen that one before!!

    • @_CryptoCat
      @_CryptoCat  Год назад +1

      Thanks mate 😊 ngrok is amazing! The main downside is you can only use 1 connection at a time on the free version. Kind of annoying because you can't have a HTTP server and TCP server exposed at once, e.g. if you want to upload a reverse shell.. you won't have the ngrok address for the netcat listener, until after you close the HTTP server.. by which time you can't upload a reverse shell 😑

    • @kartibok001
      @kartibok001 Год назад +1

      @@_CryptoCat Just to have that transfer ability between two VMs in different places will be helpful - especially on CTFs as you highlighted :)

  • @andrew99166
    @andrew99166 Год назад +4

    awesome content, as always!! 👏🏻

  • @shubham_srt
    @shubham_srt Год назад +4

    loved it

  • @RustysAdventures
    @RustysAdventures Год назад +2

    Thanks a lot for the video

  • @vivekkhandagre9274
    @vivekkhandagre9274 Год назад +1

    i love it

  • @0xhech768
    @0xhech768 Год назад +2

    Awesome content, keept going 🎉

  • @0x157
    @0x157 Год назад +2

    good video and ggs bro !

  • @kerbalette156
    @kerbalette156 Год назад +1

    Epic vid. Cheers brah

  • @Daniel-pu8xh
    @Daniel-pu8xh Год назад +3

    Great video! I think the intended way of obligatory was to leak the secret key from the flask app and forge a new cookie passing the id to 1. Once you became the admin the flag was there :-). But your way was faster 😅

    • @_CryptoCat
      @_CryptoCat  Год назад

      Cheers! The cookie forge technique is cooler imo 🙂

  • @astralwanderer3319
    @astralwanderer3319 Год назад +3

    Hey Jonah, great vid!
    Will there be another one for the forensic/reverse challs as well:) ...?

    • @_CryptoCat
      @_CryptoCat  Год назад +1

      Thanks mate! There won't anymore unfortunately, I stuck to the web category for this event. I used to try every category and make videos for each but I just don't have the time/energy these days so it's either a) do multiple categories and skip videos, or b) focus on one category and make a video 🙂

    • @astralwanderer3319
      @astralwanderer3319 Год назад

      @@_CryptoCat Oh i see:/ Well, it would be fair to say that the next year's nahamcon vid should be on the rev/forensics category. What you say:) ?

  • @c-t3ch
    @c-t3ch Год назад +1

    Great video :) I like the Color-Settings of your terminal. Is this a plugin for terminator or how did you costumize it?

    • @_CryptoCat
      @_CryptoCat  Год назад +1

      Thanks mate! It's just a customised colour profile for the terminal, you can check it here: imgur.com/a/gCnvq8A - beware that some tools really benefit from a standard colour profile though, e.g. linpeas, so it's good to create a separate profile that you can easily swap between 🙂

  • @tangiispotted
    @tangiispotted Год назад +2

    Great Video! Just wondering, what VM are you using?

    • @_CryptoCat
      @_CryptoCat  Год назад

      Thanks! I'm using ParrotOS in this video 😊

  • @BabeRyHellCat
    @BabeRyHellCat 9 месяцев назад +1

    Could you please provide walkthroughs for the Video Intigriti CTF 2023? I'm really stuck with those challenges.

    • @_CryptoCat
      @_CryptoCat  9 месяцев назад

      Hey, I'll definitely release some walkthrough videos for intigriti 1337up live 2023, both here and on intigriti's channel 😊 First one will be "Web: bounty repo" released tomorrow.. Any challenges you'd like to see specifically?

  • @ufuksahin7401
    @ufuksahin7401 Год назад +3

    amazing 🙌

  • @tazaccking7467
    @tazaccking7467 Год назад +2

    can you explain how to solve blobber and tiny-little-fibers [nahamcon CTF], as i spent so much time on them but unsuccessful in solving them

    • @_CryptoCat
      @_CryptoCat  Год назад

      I only looked at the web category for this CTF but keep an eye out on CTFtime for writeups. There isn't any there for tiny-little-fibers yet but here's blobber: ctftime.org/writeup/37281, you could also check the NahamSec discord as many people will post writeups there, but not add to CTFtime 😁

    • @tazaccking7467
      @tazaccking7467 Год назад +1

      @@_CryptoCat thank you very much

    • @hurdadurP
      @hurdadurP Год назад +2

      @@tazaccking7467 I think Tiny Little Fibers was just a JPG image with a lot of fluff at the end. Knowing the magic bytes of the image and the ending bytes were the way to solve it, as the flag is located at the end of the actual image. Magic bytes for start of stream are FFD8, end of stream are FFD9.

    • @hurdadurP
      @hurdadurP Год назад +2

      And following that, John Hammond gave an explanation in the discord what the intended solution was: strings -e l -n 2 tiny-little-fibers
      tiny = less than the default 4 characters in length
      little = little endian
      fibers = strings

    • @tazaccking7467
      @tazaccking7467 Год назад +1

      @@hurdadurP thanks bro got the flag, i used strings tiny-little-fiber in CTF for any information, at that time i dont know to use "-e l -n 2"

  • @points7824
    @points7824 Год назад +3

    Doy you use tmux?

    • @_CryptoCat
      @_CryptoCat  Год назад

      I use terminator: gnome-terminator.org