- 322
- 67 510
COZT
United States
Приєднався 19 бер 2019
Worst Coder/Hacker. Just sharing my though more like an internet blog just to watch back as I’m older
Road to Top 100 Global Ranking in HTB (Week 4Update)
Road to Top 100 Global Ranking in HTB(Week 4 Update)
Github : github.com/dannytzoc
Github : github.com/dannytzoc
Переглядів: 3
Відео
Grinding Kattis Ranked 63,133
Переглядів 92 години тому
Grinding Kattis Today did two easy problem Competitive Programming open.kattis.com/problems
Á leið í bíó - Kattis
Переглядів 712 годин тому
Á leið í bíó - Kattis Competitive Programming open.kattis.com/problems/aleidibio
Road to Top 100 Global Ranking in HTB (Week 3 Update)
Переглядів 1916 годин тому
Road to Top 100 Global Ranking in HTB(Week 3 Update) Github : github.com/dannytzoc
PicoCTF Commitment Issues
Переглядів 4День тому
PicoCTF Commitment Issues General Challenge play.picoctf.org Github : github.com/dannytzoc
PicoCTF Collaborative Development
Переглядів 8День тому
PicoCTF Collaborative Development General Challenge play.picoctf.org Github : github.com/dannytzoc
PicoCTF Blame Game
Переглядів 2День тому
PicoCTF Blame Game General Challenge play.picoctf.org Github : github.com/dannytzoc
PicoCTF CanYouSee
Переглядів 12День тому
PicoCTF CanYouSee Forensic Challenge play.picoctf.org Github : github.com/dannytzoc
PicoCTF interencdec
Переглядів 814 днів тому
PicoCTF interencdec Cryptography Challenge play.picoctf.org Github : github.com/dannytzoc
PicoCTF Time Machine
Переглядів 1114 днів тому
PicoCTF Time Machine General Challenge play.picoctf.org Github : github.com/dannytzoc
PicoCTF Codebook
Переглядів 1214 днів тому
PicoCTF Codebook General Challenge play.picoctf.org Github : github.com/dannytzoc
PicoCTF Magikarp Ground Mission
Переглядів 814 днів тому
PicoCTF Magikarp Ground Mission Reversing Challenge play.picoctf.org Github : github.com/dannytzoc
PicoCTF Transformation
Переглядів 1214 днів тому
PicoCTF Transformation Reversing Challenge play.picoctf.org Github : github.com/dannytzoc
PicoCTF HashingJobApp
Переглядів 1014 днів тому
PicoCTF HashingJobApp General Challenge play.picoctf.org Github : github.com/dannytzoc
PicoCTF First Find
Переглядів 1714 днів тому
PicoCTF First Find General Challenge play.picoctf.org Github : github.com/dannytzoc
Demn
Great !
welcome
nice vid… for the most part
for the most part yeah
@@cozt7050 😂 nah fr thanks for the vid bro
Great bro. Is picoctf live?
@@prestocranius7627 no these are old challenges that you can still acco
Beep boop bop
ta weno
Also, did u take a VHS cybersecurity course by any chance?
no i didnt what is that?
yo bro can you do scavenger hunt?
scavengerr hhunt how?
Clairo is still my favorite music artist.
bro if you say "for the most part" one more time im gonna kill myself
Lmao
Ty
can i inject bytes (.bin file) or .exe files instead of shellcode? with the techniques in the video?
bin file i think its file but exe not sure
how if in linux?
You might need to switch the payload. The payload I use was for windows
thx for the video 😁
No problem 😊
I thought that was real Google for a sec 💀💀
Imagined that would have been crazy
what software do you use
i was on manjaro last time, then for recoridng i used OBS, and the tool to reverse ghidra
neat explaination bruh. keep it up
thank you
Can I get your telegram id I need your little help
Hello sir I'm a @new_coder in rust language I want your help can you help me sir your pro in rust
good tip on sqlmap. Wasn’t aware of that tool. Thanks for sharing broski
Glad to help
really aprecciate your videos dude
thank you
😇 Promo SM
Yo saw your channel and loved it :)
Thank you!
Lesssgoooooo
well your explaination was quite good i under stand it till the file descripter part and then figure it out how to solve it thanks for the help
Lesgoooooo
Good work 🫡
Thanks 🔥
Wow brother, i did not know this website. Do you have a community or a parsonal discord for cybersecurity brother wich we can encourage ourselves and share knowlage like a forum. I would be happy to join though.cause I want to learn this.
i have a discord but a discord account but not a server i do not have one just yet.
Do you have any resources to go over to prime me for these challenges? Love your content btdubs. keep up the good work :)
Resource would probably be port swigger academy
I was just wondering were first you learned all this stuff ? I am currently working on CTFs and have seen most your lordofsqli vidéos but i dont know where you first learned all this ?
I first started off with burp suite academy with a bunch of friends then hack the box and after that I started to do ctfs on ctftime and now I’m just solving random ctf sites. It’s pretty fun it all start by just starting to do things
good shit
Thanks 🙏
But one is not supposed to be able to see the service side code.
You are right but this is a ctf challenges in some web applications you can see the source code while others you can’t at all
Hi sir I would like to know how to get started in wbe hacking,your videos actually inspired me. A reply would be fantastic. Thanks in advance
honestly best way to start learning is to self learn through a ctf watch a video series or read a book just start now and you don't need the latest computer you can do web hacking in a cheap computer or laptop just start doing it now
">=" means "greater or equal"
thank you for the catch
What is your setup on your iterm? Good video btdubs
regular zsh with a custom neofetch ascii art
You got a discord ?
Yeah ynnnad is my username
ty! I was today years old that found out XOR is actually zor!
No problem
malware development is always ethical tho it is not virus development, every enthusiast would write malware for science about how far program could be, the architecture of virus, language design, etc, it is both ethical and unethical, the benefits of this is for the future for antivirus development, language design also affect the feature of virus. that is why opensource and community exist, to make sure hobbyist are not lonely, because it could be dangerous.
This is true
@@cozt7050 good shit, keep going tho, i would like to see some nvdia/gpu coding and stuff, since AI ceo seems to be quite arrogant.
thanks for the explanation, your video is by far the best one that explains this challenge . i just would like to mention something when you want to check the binary protection just use checksec tool rather then write in the python scripte :)
Thanks for the tip!
I really liked your method, thanks for the vid! Do you have any tips or resources for learning binary exploitation/reversing for a beginner?
This is a really good intro guyinatuxedo.github.io
Great work
Thank you so much 😀
well done, thank you
No problem 👍
Lets go!
Thanks
Great explanation! Thanks!
Glad it was helpful!
"The first step toward success is taken when you refuse to be a captive of the environment in which you first find yourself." --Mark Caine
I was wondering how to bypass traversal measures. ..././ <- What`s this path? (Is this stated somewhere?)
if you ever used linux you know .. is to go back so all i was simply doing is going back. in my case i got lucky it was at that location
You were on the right path, as per the medium article you could have also chained the base64 decode to print the code on the same page. Just read few lines below. Keep posting. Love this.
Ohhhhh. Thanks for the support
Hi, This may be a stupid question, but how much time do you spend on this in a week?
Depending on how hard the ctf challenge is . I’ll say this the pwn challenges take me a couple days but the web ones are a bit easier