Steganography (1/2) BsidesCT CTF 2018
HTML-код
- Опубликовано: 4 ноя 2018
- If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
E-mail: johnhammond010@gmail.com
PayPal: paypal.me/johnhammond010
GitHub: github.com/JohnHammond
Site: www.johnhammond.org
Twitter: / _johnhammond
Glad to found this channel ! I really enjoy these ctfs.
Im a fullstack programmer and love reverse engineering and cracking stuff, security and playing around.
Keep up the good work !
This channel made me able to solve various challenges in CTFs. Thank you so much.
Awesome - tactics and tools alone are helpful, but understanding what you're looking for really makes for valuable content. Keep up the great work!
Thank you so much, will do! :D
Awesome
I learn many new things , thank you
Always a great fan of your content
I've known about CTF's for a while and it's really cool to see how it's done!
Have you played? Thanks for watching!
@@_JohnHammond I have not...YET I'm still learning independently, barely a script kiddie, but watching hacks and there implications are always fascinating to me :)
@@andrewalonsi You just gotta jump in! I am still a script kiddie too ahaha. Thanks again for watching!
Thank You for the fun and cool content! Looking forward to seeing more of your videos :D
Thank you much, exactly what I needed
My steg skills just doubled from one vid. Awesome work!!!
Very happy to hear that! Thanks so much for watching!
Awesome video where can we find some of these challenges
Learnt a lot of steg stuff today....
Uhm, noob question, soo, after i extracted an image with binwalk, i got file with a description "LRZIP compressed data - version 108.215".
However, when i checked the official github page for lrzip, the latest version was 0.631 and last updated in 2016, what did i miss here? Thank you, great video btw.
i want to get these pictures,where can i find them?
I want the link of these challenges please !
I can't find them
how to get those things you have downloaded can you give us
What app is this ? The red one at 0:45
actually iam glad to work on the website that you worked on .... but i found trouble to open it .... can any one tell me why.
I would love you to do a tutorial on how to create these puzzles from scratch. The hidden text that's visible using stegsolve, how to put that binary string into a .jpg file and into an image alpha channel etc... Preferably using GIMP and any other Linux derived software...
I can certainly make this happen. I planned to recreate the Account Takeover challenges from the Web category, but I can definitely do these as well. Thanks for the great idea, and thanks for watching! :D
sneaking_ weasel
You can someone explain the command he write after he complete a CTF
mv {,Complete}
What does that mean ???
You can someone explain the command he write after he complete a CTF
mv {,Complete}
What does that mean ???
I am just renaming the folder, and adding on "COMPLETE" at the very end. I use the braces as just quick shorthand so I don't have to repeat the filename. It's just "marking the challenge complete" so I know in the future that I solved that one :D Thank you so much for watching!
John Hammond
Thankx for the replay
But wanna know how the terminal will know what file you are talking about
mv {, complete}
Doesn’t exactly tells what file we should use ....
Why did you strip the L in the first challenge ?
L isn't a valid hexadecimal character, hex is only 0-9a-f, so I remove that so the binascii.unhexlify or .decode('hex') -- the latter being the old, now dead and unsupported Python 2 rendition -- will work without an issue. If you don't remove the L, it will error as that is a non-valid hex character. Thanks for watching!
This is awesome
Sounds like these are resurfacing at this years BsidesCT! I hope it helps! :D
what if i dont have any XP comment=?? please do magical Image gallery from hacker101 ctfs
Awesome I have no clue what your doing lol
sounds like Radbrad
3:00 steg solve
please create a discord community
Yeah man! The Discord link is in the description. You can join at discord.gg/VCwJBcn
thanks bro
> programer
> hacker
> uses linux
> uses nano instead of vim
Hahaha, this is too true. I gotta get into the habit of using vi instead of nano.
are u really posting this for us to learn or you're just posting a video for likes and comment.
you're too fast for anyone to follow, if they actually want to learn
strings
exiftool _> look for encoded stuff
java -jar stegsolve.jar
zsteg/ zsteg -a
steghide extract -sf file.jpg // use password you may find somewhere else
binwalk -dd=".*" file.jpg