- 128
- 271 136
Mike On Tech
United States
Приєднався 23 лют 2021
CTFs, programming, tech news/commentary.
PicoCTF Walkthru [112] - MatchTheRegex (Regular Expressions overview)
00:00 Intro
01:00 Inspecting the webpage source code
01:45 What are regular expressions?
02:15 regexr.com
04:20 Flag!
04:30 More detail on regular expressions
----------
Running through the CMU PicoCTF. Analysis and walkthrough of the challenge "MatchTheRegex" (play.picoctf.org/practice/challenge/356)
----------
www.reddit.com/r/mike_on_tech/
www.patreon.com/mikeontech
----------
#picoCTF #CTF #hacking #pentesting #computersecurity
01:00 Inspecting the webpage source code
01:45 What are regular expressions?
02:15 regexr.com
04:20 Flag!
04:30 More detail on regular expressions
----------
Running through the CMU PicoCTF. Analysis and walkthrough of the challenge "MatchTheRegex" (play.picoctf.org/practice/challenge/356)
----------
www.reddit.com/r/mike_on_tech/
www.patreon.com/mikeontech
----------
#picoCTF #CTF #hacking #pentesting #computersecurity
Переглядів: 268
Відео
PicoCTF Walkthru [111] - Permissions (Privilege Escalation)
Переглядів 336Рік тому
00:00 Intro 01:00 SSH'ing into the machine 01:30 Unintended solution 02:00 VIM solution 03:45 Privilege escalation explained Running through the CMU PicoCTF. Analysis and walkthrough of the challenge "Permissions " (play.picoctf.org/practice/challenge/363) www.reddit.com/r/mike_on_tech/ www.patreon.com/mikeontech #picoCTF #CTF #hacking #pentesting #computersecurity
PicoCTF Walkthru [110] - SOAP (XML XXE attack)
Переглядів 614Рік тому
00:00 Intro 00:30 Examining the website 01:50 Javascript files 03:10 Debugging the Javascript 04:10 Explaining SOAP 05:00 Explaining XXE 06:10 Developing our exploit 08:10 Flag! Running through the CMU PicoCTF. Analysis and walkthrough of the challenge "SOAP" (play.picoctf.org/practice/challenge/376) www.reddit.com/r/mike_on_tech/ www.patreon.com/mikeontech #picoCTF #CTF #hacking #pentesting #c...
PicoCTF Walkthru [109] - ReadMyCert (SSL Certificate overview)
Переглядів 279Рік тому
00:00 Intro 00:20 What is a CSR? 01:00 Showing how browsers use certs 03:25 Creating a CSR 04:50 Examining the challenge CSR 05:10 Flag! Running through the CMU PicoCTF. Analysis and walkthrough of the challenge "ReadMyCert" (play.picoctf.org/practice/challenge/367) www.reddit.com/r/mike_on_tech/ www.patreon.com/mikeontech #picoCTF #CTF #hacking #pentesting #computersecurity
PicoCTF Walkthru [108] - rotation (Caesar cipher)
Переглядів 137Рік тому
Running through the CMU PicoCTF. Analysis and walkthrough of the challenge "rotation" (play.picoctf.org/practice/challenge/373) www.reddit.com/r/mike_on_tech/ www.patreon.com/mikeontech #picoCTF #CTF #hacking #pentesting #computersecurity
PicoCTF Walkthru [107] - repetitions (base64 obfuscation)
Переглядів 86Рік тому
00:00 Intro 00:20 Examining the file 00:30 CyberChef solution 01:30 Looping in CyberChef 02:00 Flag! 02:15 Python solution Running through the CMU PicoCTF. Analysis and walkthrough of the challenge "repetitions" (play.picoctf.org/practice/challenge/371) www.reddit.com/r/mike_on_tech/ www.patreon.com/mikeontech #picoCTF #CTF #hacking #pentesting #computersecurity
PicoCTF Walkthru [106] - chrono (Linux Cron intro)
Переглядів 284Рік тому
00:00 Intro 01:00 Google results 02:10 SSH'ing in 04:15 Flag! Running through the CMU PicoCTF. Analysis and walkthrough of the challenge "chrono" (play.picoctf.org/practice/challenge/347) www.reddit.com/r/mike_on_tech/ www.patreon.com/mikeontech #picoCTF #CTF #hacking #pentesting #computersecurity
PicoCTF Walkthru [107] - money-ware (Ransomware open source intel)
Переглядів 216Рік тому
00:00 Intro 00:45 Bitcoin Abuse DB website 01:25 Sample Ransomware letter 01:43 Explaining Ransomware 02:10 Flag! 02:20 Complaining about cryptocurrencies Running through the CMU PicoCTF. Analysis and walkthrough of the challenge "money-ware" (play.picoctf.org/practice/challenge/357) www.reddit.com/r/mike_on_tech/ www.patreon.com/mikeontech #picoCTF #CTF #hacking #pentesting #computersecurity
PicoCTF Walkthru [105] - timer (Android APK reversing)
Переглядів 354Рік тому
00:00 Intro 00:25 'file' command 00:45 An APK is a fancy ZIP file 01:30 Android compilation process 02:00 DEX files 03:10 JADX Decompiler 04:00 Flag! 05:15 'strings' as an alternative solution Running through the CMU PicoCTF. Analysis and walkthrough of the challenge "timer" (play.picoctf.org/practice/challenge/381) www.reddit.com/r/mike_on_tech/ www.patreon.com/mikeontech #picoCTF #CTF #hackin...
PicoCTF Walkthru [104] - Safe Opener 2 (Java class file reversing)
Переглядів 105Рік тому
00:00 Intro 00:25 'files' 00:45 Creating our own .class file 01:50 'strings' 02:15 Flag! 02:20 Examining the .class file 02:45 JD-GUI (decompiler) Running through the CMU PicoCTF. Analysis and walkthrough of the challenge "Safe Opener 2" (play.picoctf.org/practice/challenge/375) www.reddit.com/r/mike_on_tech/ www.patreon.com/mikeontech #picoCTF #CTF #hacking #pentesting #computersecurity
PicoCTF Walkthru [104] - useless (man pages intro)
Переглядів 173Рік тому
Running through the CMU PicoCTF. Analysis and walkthrough of the challenge "useless" (play.picoctf.org/practice/challenge/384) www.reddit.com/r/mike_on_tech/ www.patreon.com/mikeontech #picoCTF #CTF #hacking #pentesting #computersecurity
PicoCTF Walkthru [103] - More Cookies
Переглядів 4,5 тис.Рік тому
00:00 Intro 01:07 Examining the "auth" cookie 01:55 Inspecting the HTML 02:25 Homomorphic encryption 03:00 Ranting about crypto never showing examples 05:12 A writeup 06:32 Code I adapted 09:37 Block cipher applied repeatedly 11:42 Explaining the byte flipping 15:32 Sending byte flipped cookies to the server 18:15 Spamming the server w/ cookies 19:02 Flag! 19:37 Using the cookie in the browser ...
PicoCTF Walkthru [102] - Easy1
Переглядів 199Рік тому
00:00 Intro 00:49 The Vigenere Table 01:45 Automating table lookup w/ Python 06:00 Flag! 06:20 Vigenere cipher theory 09:00 Another way to solve (CyberChef) Running through the CMU PicoCTF. Analysis and walkthrough of the challenge "Easy1" (play.picoctf.org/practice/challenge/43) www.reddit.com/r/mike_on_tech/ www.patreon.com/mikeontech #picoCTF #CTF #hacking #pentesting #computersecurity
PicoCTF Walkthru [101] - Java Script Kiddie (JavaScript debugging/reversing)
Переглядів 1 тис.Рік тому
00:00 Intro 00:40 Examining the webpage 02:20 Broken image 03:20 Providing a base64 image 04:30 Refactoring 07:40 Offset -48 trick 11:08 Serving the webpage locally to refactor 21:50 Reviewing what we learned 22:40 PNG spec 26:05 Looking at the solving code 32:40 Screwing up some python (to save time!) 34:13 The Key! 34:40 A QR Code 34:55 Flag! Running through the CMU PicoCTF. Analysis and walk...
PicoCTF Walkthru [100] - The Numbers
Переглядів 437Рік тому
00:00 Intro 00:25 Looking at the image 01:00 Automating translation w/ Python 03:28 Flag! Running through the CMU PicoCTF. Analysis and walkthrough of the challenge "The Numbers" (play.picoctf.org/practice/challenge/68) www.reddit.com/r/mike_on_tech/ www.patreon.com/mikeontech #picoCTF #CTF #hacking #pentesting #computersecurity
PicoCTF Walkthru [97] - Caesar (Caesar Cipher + CyberChef intro)
Переглядів 1,1 тис.Рік тому
PicoCTF Walkthru [97] - Caesar (Caesar Cipher CyberChef intro)
OverTheWire - Bandit Level 6 walkthrough (troubleshooting tutorial)
Переглядів 5872 роки тому
OverTheWire - Bandit Level 6 walkthrough (troubleshooting tutorial)
OverTheWire - Bandit Level 5 walkthrough
Переглядів 3782 роки тому
OverTheWire - Bandit Level 5 walkthrough
OverTheWire - Bandit Level 4 walkthrough
Переглядів 5592 роки тому
OverTheWire - Bandit Level 4 walkthrough
OverTheWire - Bandit Level 1 walkthrough
Переглядів 1,2 тис.2 роки тому
OverTheWire - Bandit Level 1 walkthrough
OverTheWire - Bandit Level 3 walkthrough
Переглядів 5502 роки тому
OverTheWire - Bandit Level 3 walkthrough
OverTheWire - Bandit Level 2 walkthrough
Переглядів 6062 роки тому
OverTheWire - Bandit Level 2 walkthrough
OverTheWire - Bandit (Overview + Level 0 walkthrough)
Переглядів 2,1 тис.2 роки тому
OverTheWire - Bandit (Overview Level 0 walkthrough)
PicoCTF Walkthru [95] - Fresh Java (Java Decompilation)
Переглядів 1882 роки тому
PicoCTF Walkthru [95] - Fresh Java (Java Decompilation)
PicoCTF Walkthru [94] - Packets Primer (Basic Wireshark usage)
Переглядів 4922 роки тому
PicoCTF Walkthru [94] - Packets Primer (Basic Wireshark usage)
PicoCTF Walkthru [93] - File Types - Shell script debugging, File inspection, Intense suffering
Переглядів 6102 роки тому
PicoCTF Walkthru [93] - File Types - Shell script debugging, File inspection, Intense suffering
PicoCTF Walkthru [92] - Redaction Gone Wrong
Переглядів 4992 роки тому
PicoCTF Walkthru [92] - Redaction Gone Wrong
but why we entered robots.txt after the URL how do you know that ??
love how you explain all the different ways of approaching any problem and also talk about the takeaways; thank you so much!
I'm glad you liked the different approaches!
hey was just wondering what was it you clicked in too to open the ssh
good one mike...
Thanks mahn.😢
thank you very much
Great explanation, sir!
How do you get so good at this stuff? Also, you're super helpful, it helps a lot. Thank you!
how do you get the terminal to color code commands?
The 128 times loop ig wasn't necessary you could have just shifted 1 bit 8 times and flipped that bit. So, 8 would be the inner loop count.
Bende ....Hiding-from-you yazıyor bunu nasıl çözebilirim
my payload attack won't work, my "request count" is 0 and i have no clue how to change it
and i followed step-by-step this video.. so if you have an idea i need it
only video/writeup that helped me understand this one, thanks a lot!
Glad it helped!
Thanks ;)
No problem
thanks for this
You're welcome
This is excellent explanation. Kudos. Just one correction. @12:48, the ord() value of the second letter "i" is not changed to binary. Instead the binary value "0111000000000000" is converted back to decimal, which is "28672". Then they both are added and we get 28777. We then view it in hex, which is 7069^16 and the corresponding Japanese symbol. For anyone like me who's confused on the part where he adds both the binary values, here's the explanation. Thanks!
Appreciate the correction.
Man you’re really making things easier for me Thank you! I know I’m a little late but I can’t help but thank you for what you’re doing It’s truly amazing
Happy to help!
why using static ?
thanks for giving such a detailed explanation
Glad it was helpful!
Great content man, I appreciate these videos
I appreciate that!
how did you come to know that its robots,=.txt file
This is one of those things that you learn once, then know to look for. Its a file that web crawlers read.
@@mike_on_tech but how did you know it was called Robots? Sorry this one is confusing to me
Never mind I see that its going to be called "robots.txt" in most cases lol. Thank you for the video!
Great content, many thanks!
My pleasure!
I really appreciate these videos man, they're really helpful
Glad to hear it!
Thank you ! I was stuck in this for a long time !! Love your in-depth explanation ❤
Awesome, glad to help!
very detailed explanation thank you!
Glad you enjoyed it!
hey sir, thanks for another detailed and well explained walk through, i just started ctf so this challenge was quite challenging and took a toll on me. im always loving your videos keep it up!
Awesome, thanks for letting me know. Always makes my day to see comments like these!
i have learnt so much again thank to you sir!
best ctf tutor i love this channel!
Thanks! Comments like these make my day!
Hello Mike! I really enjoyed your video thank you very much for your content. On how to find what the flags mean, I was able to do that, though it took me ages. In this video: ua-cam.com/video/SSsBmJJkSL0/v-deo.htmlsi=7Kb7u5WfwnZ1sQap I talk about it. Feel free to take a look and once again great content! Cheers 😉
thx
asdkasmdolkmasod :D
thank you for explaining it thoroughly!
No worries!
echo 'string_to_be_decoded' | base64 --decode
Thx!
bro im unable to enter the cipher text but i can enter the modulus and e values
so hard but 3000 view lol
udp contains pico is not working
Thanks you, I’ve been working through all of these using your walk throughs and learning about each one
Glad you like them!
Man! I owe you a case of beer or a nice dinner for you and your family. Dear lord the TLS dissectors section is so misleading. Who at Wireshark likes to do their work writing in ALL CAPS when it only accepts lowercase? That bugged me for hours and it didn't make any sense. Thank you truly! So much. That was driving me mad and making me feel dump. This helped so much.
Thanks, glad to help. Have a good new year!
Okay, this was a fun one
U are awesome bro❤
Thanks!
for some reason my gave me Errors No payload positions defined. anyone out there that could help
I decided to do some picoCTFs.. I was a bit disappointed by the brute force method.. I was thinking-- it cant possibly be pick and guess.. but sure enough.. I don't know much about python.. so I guess I am happy with this more in depth tutorial. This has been the worst picoCTF I've done so far, but mostly because I had to brute force it
Brute force it with a script 🤦🏿♂️
You do know you don't have to do it manually right u can change the python program to give the flag directly
how they know it is bitflip?
haha I love the way he explain 😄
by far the worst youtube tutorial i have seen on this. why even help
Thank you
You're welcome
/usr/bin/python: can't find '__main__' module in what does that mean
anyone who is trying the above challenge take a note that --unicpher no more exists it is --decrypt ......... just run the python3 "scriptname" to see the help manpage
reversing the flag code isnt working for me for some reason.