GuidePoint Security CTF - Custom Base64 Languages - Kirby & Alphabet

Поделиться
HTML-код
  • Опубликовано: 27 ноя 2024

Комментарии • 116

  • @-mau
    @-mau 3 года назад +71

    Instead of typing print(f"our_alphabet = {our_alphabet}") you could use this syntax instead: print(f"{our_alphabet=}"). Love your videos, keep it up! ❤️

    • @_JohnHammond
      @_JohnHammond  3 года назад +22

      HOLY CRAP. I had no idea that was a thing. That is so awesome, thank you!!!

    • @TheJobCompany
      @TheJobCompany 3 года назад +1

      @@_JohnHammond makes sense, that was added in python3.8

    • @cedricvillani8502
      @cedricvillani8502 3 года назад

      You should explain boolean algebra, truth tables and karnaul maps. And include logic gates AND OR NOT XOR bla bla etc.. I would also say base2 to base6 to base10 , but probably too much for one video

    • @smaa01
      @smaa01 3 года назад +1

      f string ❤

    • @sujatapanigrahy7172
      @sujatapanigrahy7172 3 года назад

      Import Viewer
      Video.append(f"{silence.play()}...{silence.stop()}hey everybody, my name is John Hammond")
      Viewer.heartattack()
      Video.append(f"{rest of the video}")

  • @mrjoeymelo
    @mrjoeymelo 3 года назад +35

    John: “You might already know the answer”
    Me: “googles what does #!/usr/bin/env means”

    • @jonny-mp3
      @jonny-mp3 3 года назад +1

      what does it mean xD

    • @DHIRAL2908
      @DHIRAL2908 3 года назад +6

      @@jonny-mp3 select the interpreter from the environment. Basically find the interpreter binary from PATH variables.

    • @benjamindavid4360
      @benjamindavid4360 3 года назад +2

      thank you! i needed this comment :D

  • @thatcreole9913
    @thatcreole9913 3 года назад +35

    I love this channel.

  • @matthewlandry1352
    @matthewlandry1352 3 года назад

    You nail it every time John. (Even though you get nervous about it). Showcasing your METHODOLOGIES(including the rabbit holes helps the Noobs) is why I watch ALL your videos!

  • @kyay10
    @kyay10 3 года назад +6

    I was screaming at the screen "just use an identity string!". As in, just run through all the bytes between 00000000 and 11111111, convert that to a string, send it, and you'll get out their key right away, which is practically what you did, but with like 5 levels of indirection lol

  • @anchorheavenonearth
    @anchorheavenonearth 3 года назад

    John your CTF projects have been so informative and great fun to watch. This is helping shape the way to a more "outside of the box" way of tackling certain issues we may experience in the infosec pathway. (HTB pun intended)

  • @jht5225
    @jht5225 3 года назад +1

    Stumbled onto your channel. Love your breaking apart of malware. Honestly you couldn’t make enough of it, so good

  • @jeremymadray1438
    @jeremymadray1438 3 года назад

    I have no idea what's happening but it's really cool and I've been binging all of your videos. And honestly, with my limited programming knowledge, I am learning a lot! You're amazing bro!

  • @NateRoberts
    @NateRoberts 3 года назад

    I can’t say I really followed along with the Python at the end, BUT honestly it makes me feel better knowing that John struggled with it too the first time. Appreciate the content as always!

  • @route_switch
    @route_switch 3 года назад

    I really like seeing your thought process it really helps me to learn more. Thanks John

  • @48pluto
    @48pluto 3 года назад

    Its nice to see the whole thought proces going on and learn from it. Thanks for the video.

  • @fausto2328
    @fausto2328 3 года назад

    man found your channel yesterday and I'm really liking thoses challanges, will start doing some in the weekend when I have free time, keep the great work

  • @MirekEndys
    @MirekEndys 3 года назад +1

    Thats fun to watch your thinking processes 😂 Helps me to learn and shows me new ways Thanks 👊😎🤟

  • @bladesvlogs4965
    @bladesvlogs4965 3 года назад +1

    1 glass of wine while watching this and I kept up, but my brain was melting by the end :P

  • @James200319
    @James200319 3 года назад +3

    Got me interested in joining THM and practicing my skills again

  • @TheH2OWeb
    @TheH2OWeb 3 года назад

    Your videos encourage me to try harder. Thank You !

  • @TheAyushbest1
    @TheAyushbest1 3 года назад

    New videos coming on back to back!

  • @watchdog2864
    @watchdog2864 3 года назад

    I’ve been trying for so long to find how not to show the ‘connecting to host’ message. You’re a saviour.

  • @joelthomas4911
    @joelthomas4911 3 года назад +1

    That intro was legendary!! 😂😂😂

  • @arctis_shark
    @arctis_shark 3 года назад +5

    For the algorythm!!

  • @padreigh
    @padreigh 2 года назад

    With an transparent image (like this one) you could also encode stuff as colors and set them as opacity = 0 - essentialy hiding the information within the images fully transparent pixels.

  • @bla-skills
    @bla-skills 3 года назад

    What an adventure, great content.
    Btw I think the trailing = are because you included them in your payload. It's for padding so their encoded message has to encode the padding char.

  • @deutschmitvkEins
    @deutschmitvkEins 3 года назад

    Cool Guide, I probably have to re-watch it !!

  • @Daxiel-vk7wj
    @Daxiel-vk7wj 3 года назад

    Was waiting for this! Thank you!

  • @defyteryt2452
    @defyteryt2452 3 года назад

    I love this person

  • @rdius4822
    @rdius4822 3 года назад +3

    I clicked because of Kirby :)

    • @zwz.zdenek
      @zwz.zdenek 3 года назад

      I stayed for the coding.

  • @LinuxSploitOfficial
    @LinuxSploitOfficial 3 года назад +1

    Thanks

  • @patchbyte6856
    @patchbyte6856 3 года назад +1

    thats gonna be good

  • @aniketsharma7333
    @aniketsharma7333 3 года назад +1

    CTF...long time 🥳

  • @dedkeny
    @dedkeny 3 года назад +1

    Doing it for the almighty Algo

  • @sammo7877
    @sammo7877 3 года назад +1

    you look tired in this video John :) great video as always though! keep them coming

  • @renemertinsful
    @renemertinsful 3 года назад +2

    Nice video
    Butt wouldn't it be much easier to directly send the bytes from 0 to FF as message? The result should be the used alphabet plus the equal sign. As I understand how base64 works.

    • @alexmeyer4598
      @alexmeyer4598 3 года назад

      That's basically what he ended up doing, in a super roundabout way. By taking the normal base64 letters in order and decoding them, you'd just end up with bytes 00-FF.

    • @renemertinsful
      @renemertinsful 3 года назад

      @@alexmeyer4598 but my brain hurts when I have to think this way. Bit shifting would be so much easier and more explaining

    • @alexmeyer4598
      @alexmeyer4598 3 года назад +2

      @@renemertinsful oh for sure. Just sending the raw bytes 00-FF is way more straight-forward, and would actually demonstrate how base64 works in a very nice, visual way.
      I was trying not to yell at my screen when he started doing it this way. Lol. I think he was just overthinking the problem a little bit.

  • @tjokkerstar1462
    @tjokkerstar1462 3 года назад

    Please use drak reader or something so i don't get flash banged whenever you go to google or Wikipedia :P Also nice video i was so lost with all the Alphabet stuff :P

  • @GeekBatman
    @GeekBatman 3 года назад

    Jeez man!!! That jump scare right at the beginning!?!?! Not cool! 🤣

  • @bonus4uspace18
    @bonus4uspace18 3 года назад

    Thank you so much

  • @jorgevilla6523
    @jorgevilla6523 3 года назад

    haha what a intro appear from no where!!!

  • @0xff1337
    @0xff1337 3 года назад +1

    Nice t-shirt 👌

  • @RTCW-ET-MOVIES
    @RTCW-ET-MOVIES 3 года назад

    A random John appears!

  • @omarkhalid2966
    @omarkhalid2966 3 года назад

    Woooooow

  • @miza8421
    @miza8421 3 года назад +1

    Hey John or others; How do you manage to access the CTF after the event is over? My vpn access no longer works since the ctf has terminated. Cheers I always love your videos

  • @flaviuscondurache2688
    @flaviuscondurache2688 3 года назад

    Cool solution, though I think you could have use your original solution. You had your alphabet and your encoded string, that showed you the offset or the index in the alphabet, and their encoded string gave you what character should be at that offset or index. This means you could have rebuild the alphabet a letter at a time, though it’s not an elegant solution, I think it would have worked.

  • @Pharm8alin
    @Pharm8alin 3 года назад

    This one is good and fun.

  • @lewisstevens1
    @lewisstevens1 3 года назад

    I miss playing with these things! Including hackthebox, but never get time nowadays!

  • @BECSE-SSubiramaniyan
    @BECSE-SSubiramaniyan 3 года назад +3

    John kindly tell about your windows privesec methodology
    #stress_full_windows-privesec🥺

  • @MultimediaCizzy
    @MultimediaCizzy 3 года назад +1

    How is your vm running that smooth tho? Did you give it like exta graphics or 32 GB of RAM? What's the Host OS ?

    • @_JohnHammond
      @_JohnHammond  3 года назад +1

      This rig has 64 GB of RAM, 28 TB storage, and 48 hyperthreaded cores. My wallet still hurts. Windows on the host in this case, and yeah like 16 GB of RAM or so for the guest.

    • @MultimediaCizzy
      @MultimediaCizzy 3 года назад +1

      @@_JohnHammond damn bro, you gettin' kinda serious (⊙_⊙;) 😂😂

  • @dsdgaming2242
    @dsdgaming2242 3 года назад

    Is this machine you are working on the one that you recently build ?

  • @ARZ10198
    @ARZ10198 3 года назад +1

    Peculiar

  • @babakfp
    @babakfp 3 года назад +2

    Hi John. Can use encode a Python .exe file with C++? I mean encode it to antiviruses couldn't recognize the app as malware :| Is there any documentation?

  • @PatrickAllenNL
    @PatrickAllenNL 3 года назад

    Hi John, I watch your videos and have zero experience in this field, basic knowledge. I have a question,
    Is it possible to write some kind of virus or malicious program that sits on my network. Then when I get hacked or attacked it basically defends by frying the attackers CPU or anything like that. What would that look like?
    This is kind of a wet dream of mine, making the blackhats cry and die inside.

  • @TracerPortable
    @TracerPortable 3 года назад

    I need further explanation why decoded regular alphabet after encoding with custom alphabet returns that alphabet. Why this is working that way?

  • @jhbonarius
    @jhbonarius 3 года назад +6

    I had to rewatch the first 13 seconds of the video a number of times. What's happening with your mouth? Are you a vertriloquist (or however you spell that)?

    • @andrewferguson6901
      @andrewferguson6901 3 года назад

      @@fdsafdsafdsafdsafd sometimes magic is more appealing

  • @SuperROFLWAFL
    @SuperROFLWAFL 3 года назад +1

    Is 'tack' what a hyphen is called in the command line, or is this a Hammond'ism?

    • @PreetisKitchenltr
      @PreetisKitchenltr 3 года назад +2

      Many People Call It Tack. You Can Also Call It Dash Or Hyphen...

    • @SuperROFLWAFL
      @SuperROFLWAFL 3 года назад +1

      @@PreetisKitchenltr thank you!

  • @wrng-i9f
    @wrng-i9f 3 года назад +11

    👀

  • @blade1551431
    @blade1551431 3 года назад

    do you complete CTF-s before recording?

  • @InfoSecDojo
    @InfoSecDojo 3 года назад +1

    i missed this CTF bcoz of my exams 😔😔

  • @fordorth
    @fordorth 3 года назад

    What were you doing down there John?

  • @enhboldotgonbaatar248
    @enhboldotgonbaatar248 3 года назад

    hONNjAMMOND

  • @phantom_stnd
    @phantom_stnd 3 года назад

    why do you import a library to use xor? does python don't have it by default?

  • @rohitjadhav4868
    @rohitjadhav4868 3 года назад

    How are you getting all this malware samples pleas tell

  • @N4dirCh
    @N4dirCh 3 года назад

    wow

  • @dekajulian7296
    @dekajulian7296 3 года назад +1

    I really need a guide or book about python for CTF. I am always stuck with challenge that need python or other like bash etc

  • @SuperMarkusparkus
    @SuperMarkusparkus 3 года назад

    Just send over the base64-decoded base64-alphabet to the server and get the answer back.

  • @mr.lineleaf8111
    @mr.lineleaf8111 3 года назад

    Nah man, show us every thing
    I like to see the thought process

  • @doyk_rest
    @doyk_rest 3 года назад

    whats that ending song ?

  • @frostburns4029
    @frostburns4029 3 года назад +1

    18:12's in Try English.

  • @dardrax
    @dardrax 3 года назад +1

    Hehe

  • @thengakola6217
    @thengakola6217 3 года назад

    isnt decode() same as decode('utf-8') ?

  • @blade1551431
    @blade1551431 3 года назад

    can u make a video on how to make VM and install all tools for CTF

  • @andmo90
    @andmo90 3 года назад

    WHERE DID YOU COME FROM??!

  • @mdiaz2111
    @mdiaz2111 3 года назад

    Does he have ubuntu or kali im alittle confused does ubuntu have pen tools ?

    • @_JohnHammond
      @_JohnHammond  3 года назад

      I'm using Ubuntu. You can install any tools you'd like :)

  • @squeelyinc
    @squeelyinc 3 года назад

    I need to get involved in python

  • @cedricvillani8502
    @cedricvillani8502 3 года назад

    More like Kirby sucked up the flag. This comment is sponsored by LastPass

  • @jhhi7223
    @jhhi7223 3 года назад

    Hi

  • @sujatapanigrahy7172
    @sujatapanigrahy7172 3 года назад

    Import Viewer
    Video.append(f"{silence.play()}...{silence.stop()}hey everybody, my name is John Hammond")
    Viewer.heartattack()
    Video.append(f"{rest of the video}")