Mike On Tech
Mike On Tech
  • 128
  • 271 136
PicoCTF Walkthru [112] - MatchTheRegex (Regular Expressions overview)
00:00 Intro
01:00 Inspecting the webpage source code
01:45 What are regular expressions?
02:15 regexr.com
04:20 Flag!
04:30 More detail on regular expressions
----------
Running through the CMU PicoCTF. Analysis and walkthrough of the challenge "MatchTheRegex" (play.picoctf.org/practice/challenge/356)
----------
www.reddit.com/r/mike_on_tech/
www.patreon.com/mikeontech
----------
#picoCTF #CTF #hacking #pentesting #computersecurity
Переглядів: 268

Відео

PicoCTF Walkthru [111] - Permissions (Privilege Escalation)
Переглядів 336Рік тому
00:00 Intro 01:00 SSH'ing into the machine 01:30 Unintended solution 02:00 VIM solution 03:45 Privilege escalation explained Running through the CMU PicoCTF. Analysis and walkthrough of the challenge "Permissions " (play.picoctf.org/practice/challenge/363) www.reddit.com/r/mike_on_tech/ www.patreon.com/mikeontech #picoCTF #CTF #hacking #pentesting #computersecurity
PicoCTF Walkthru [110] - SOAP (XML XXE attack)
Переглядів 614Рік тому
00:00 Intro 00:30 Examining the website 01:50 Javascript files 03:10 Debugging the Javascript 04:10 Explaining SOAP 05:00 Explaining XXE 06:10 Developing our exploit 08:10 Flag! Running through the CMU PicoCTF. Analysis and walkthrough of the challenge "SOAP" (play.picoctf.org/practice/challenge/376) www.reddit.com/r/mike_on_tech/ www.patreon.com/mikeontech #picoCTF #CTF #hacking #pentesting #c...
PicoCTF Walkthru [109] - ReadMyCert (SSL Certificate overview)
Переглядів 279Рік тому
00:00 Intro 00:20 What is a CSR? 01:00 Showing how browsers use certs 03:25 Creating a CSR 04:50 Examining the challenge CSR 05:10 Flag! Running through the CMU PicoCTF. Analysis and walkthrough of the challenge "ReadMyCert" (play.picoctf.org/practice/challenge/367) www.reddit.com/r/mike_on_tech/ www.patreon.com/mikeontech #picoCTF #CTF #hacking #pentesting #computersecurity
PicoCTF Walkthru [108] - rotation (Caesar cipher)
Переглядів 137Рік тому
Running through the CMU PicoCTF. Analysis and walkthrough of the challenge "rotation" (play.picoctf.org/practice/challenge/373) www.reddit.com/r/mike_on_tech/ www.patreon.com/mikeontech #picoCTF #CTF #hacking #pentesting #computersecurity
PicoCTF Walkthru [107] - repetitions (base64 obfuscation)
Переглядів 86Рік тому
00:00 Intro 00:20 Examining the file 00:30 CyberChef solution 01:30 Looping in CyberChef 02:00 Flag! 02:15 Python solution Running through the CMU PicoCTF. Analysis and walkthrough of the challenge "repetitions" (play.picoctf.org/practice/challenge/371) www.reddit.com/r/mike_on_tech/ www.patreon.com/mikeontech #picoCTF #CTF #hacking #pentesting #computersecurity
PicoCTF Walkthru [106] - chrono (Linux Cron intro)
Переглядів 284Рік тому
00:00 Intro 01:00 Google results 02:10 SSH'ing in 04:15 Flag! Running through the CMU PicoCTF. Analysis and walkthrough of the challenge "chrono" (play.picoctf.org/practice/challenge/347) www.reddit.com/r/mike_on_tech/ www.patreon.com/mikeontech #picoCTF #CTF #hacking #pentesting #computersecurity
PicoCTF Walkthru [107] - money-ware (Ransomware open source intel)
Переглядів 216Рік тому
00:00 Intro 00:45 Bitcoin Abuse DB website 01:25 Sample Ransomware letter 01:43 Explaining Ransomware 02:10 Flag! 02:20 Complaining about cryptocurrencies Running through the CMU PicoCTF. Analysis and walkthrough of the challenge "money-ware" (play.picoctf.org/practice/challenge/357) www.reddit.com/r/mike_on_tech/ www.patreon.com/mikeontech #picoCTF #CTF #hacking #pentesting #computersecurity
PicoCTF Walkthru [105] - timer (Android APK reversing)
Переглядів 354Рік тому
00:00 Intro 00:25 'file' command 00:45 An APK is a fancy ZIP file 01:30 Android compilation process 02:00 DEX files 03:10 JADX Decompiler 04:00 Flag! 05:15 'strings' as an alternative solution Running through the CMU PicoCTF. Analysis and walkthrough of the challenge "timer" (play.picoctf.org/practice/challenge/381) www.reddit.com/r/mike_on_tech/ www.patreon.com/mikeontech #picoCTF #CTF #hackin...
PicoCTF Walkthru [104] - Safe Opener 2 (Java class file reversing)
Переглядів 105Рік тому
00:00 Intro 00:25 'files' 00:45 Creating our own .class file 01:50 'strings' 02:15 Flag! 02:20 Examining the .class file 02:45 JD-GUI (decompiler) Running through the CMU PicoCTF. Analysis and walkthrough of the challenge "Safe Opener 2" (play.picoctf.org/practice/challenge/375) www.reddit.com/r/mike_on_tech/ www.patreon.com/mikeontech #picoCTF #CTF #hacking #pentesting #computersecurity
PicoCTF Walkthru [104] - useless (man pages intro)
Переглядів 173Рік тому
Running through the CMU PicoCTF. Analysis and walkthrough of the challenge "useless" (play.picoctf.org/practice/challenge/384) www.reddit.com/r/mike_on_tech/ www.patreon.com/mikeontech #picoCTF #CTF #hacking #pentesting #computersecurity
PicoCTF Walkthru [103] - More Cookies
Переглядів 4,5 тис.Рік тому
00:00 Intro 01:07 Examining the "auth" cookie 01:55 Inspecting the HTML 02:25 Homomorphic encryption 03:00 Ranting about crypto never showing examples 05:12 A writeup 06:32 Code I adapted 09:37 Block cipher applied repeatedly 11:42 Explaining the byte flipping 15:32 Sending byte flipped cookies to the server 18:15 Spamming the server w/ cookies 19:02 Flag! 19:37 Using the cookie in the browser ...
PicoCTF Walkthru [102] - Easy1
Переглядів 199Рік тому
00:00 Intro 00:49 The Vigenere Table 01:45 Automating table lookup w/ Python 06:00 Flag! 06:20 Vigenere cipher theory 09:00 Another way to solve (CyberChef) Running through the CMU PicoCTF. Analysis and walkthrough of the challenge "Easy1" (play.picoctf.org/practice/challenge/43) www.reddit.com/r/mike_on_tech/ www.patreon.com/mikeontech #picoCTF #CTF #hacking #pentesting #computersecurity
PicoCTF Walkthru [101] - Java Script Kiddie (JavaScript debugging/reversing)
Переглядів 1 тис.Рік тому
00:00 Intro 00:40 Examining the webpage 02:20 Broken image 03:20 Providing a base64 image 04:30 Refactoring 07:40 Offset -48 trick 11:08 Serving the webpage locally to refactor 21:50 Reviewing what we learned 22:40 PNG spec 26:05 Looking at the solving code 32:40 Screwing up some python (to save time!) 34:13 The Key! 34:40 A QR Code 34:55 Flag! Running through the CMU PicoCTF. Analysis and walk...
PicoCTF Walkthru [100] - The Numbers
Переглядів 437Рік тому
00:00 Intro 00:25 Looking at the image 01:00 Automating translation w/ Python 03:28 Flag! Running through the CMU PicoCTF. Analysis and walkthrough of the challenge "The Numbers" (play.picoctf.org/practice/challenge/68) www.reddit.com/r/mike_on_tech/ www.patreon.com/mikeontech #picoCTF #CTF #hacking #pentesting #computersecurity
PicoCTF Walkthru [99] - Big Zip
Переглядів 799Рік тому
PicoCTF Walkthru [99] - Big Zip
PicoCTF Walkthru [98] - First Find
Переглядів 364Рік тому
PicoCTF Walkthru [98] - First Find
PicoCTF Walkthru [97] - Caesar (Caesar Cipher + CyberChef intro)
Переглядів 1,1 тис.Рік тому
PicoCTF Walkthru [97] - Caesar (Caesar Cipher CyberChef intro)
PicoCTF Walkthru [96] - New Caesar
Переглядів 648Рік тому
PicoCTF Walkthru [96] - New Caesar
OverTheWire - Bandit Level 6 walkthrough (troubleshooting tutorial)
Переглядів 5872 роки тому
OverTheWire - Bandit Level 6 walkthrough (troubleshooting tutorial)
OverTheWire - Bandit Level 5 walkthrough
Переглядів 3782 роки тому
OverTheWire - Bandit Level 5 walkthrough
OverTheWire - Bandit Level 4 walkthrough
Переглядів 5592 роки тому
OverTheWire - Bandit Level 4 walkthrough
OverTheWire - Bandit Level 1 walkthrough
Переглядів 1,2 тис.2 роки тому
OverTheWire - Bandit Level 1 walkthrough
OverTheWire - Bandit Level 3 walkthrough
Переглядів 5502 роки тому
OverTheWire - Bandit Level 3 walkthrough
OverTheWire - Bandit Level 2 walkthrough
Переглядів 6062 роки тому
OverTheWire - Bandit Level 2 walkthrough
OverTheWire - Bandit (Overview + Level 0 walkthrough)
Переглядів 2,1 тис.2 роки тому
OverTheWire - Bandit (Overview Level 0 walkthrough)
PicoCTF Walkthru [95] - Fresh Java (Java Decompilation)
Переглядів 1882 роки тому
PicoCTF Walkthru [95] - Fresh Java (Java Decompilation)
PicoCTF Walkthru [94] - Packets Primer (Basic Wireshark usage)
Переглядів 4922 роки тому
PicoCTF Walkthru [94] - Packets Primer (Basic Wireshark usage)
PicoCTF Walkthru [93] - File Types - Shell script debugging, File inspection, Intense suffering
Переглядів 6102 роки тому
PicoCTF Walkthru [93] - File Types - Shell script debugging, File inspection, Intense suffering
PicoCTF Walkthru [92] - Redaction Gone Wrong
Переглядів 4992 роки тому
PicoCTF Walkthru [92] - Redaction Gone Wrong

КОМЕНТАРІ

  • @SowmyaMaddukuri
    @SowmyaMaddukuri 21 день тому

    but why we entered robots.txt after the URL how do you know that ??

  • @sfwani
    @sfwani Місяць тому

    love how you explain all the different ways of approaching any problem and also talk about the takeaways; thank you so much!

    • @mike_on_tech
      @mike_on_tech Місяць тому

      I'm glad you liked the different approaches!

  • @adamcollins9622
    @adamcollins9622 Місяць тому

    hey was just wondering what was it you clicked in too to open the ssh

  • @idsoftware7
    @idsoftware7 Місяць тому

    good one mike...

  • @mphatsomisinde418
    @mphatsomisinde418 2 місяці тому

    Thanks mahn.😢

  • @NguyễnLong-o1t
    @NguyễnLong-o1t 3 місяці тому

    thank you very much

  • @euler7586
    @euler7586 4 місяці тому

    Great explanation, sir!

  • @TerricTriglycerides
    @TerricTriglycerides 5 місяців тому

    How do you get so good at this stuff? Also, you're super helpful, it helps a lot. Thank you!

  • @AsheraLoux
    @AsheraLoux 5 місяців тому

    how do you get the terminal to color code commands?

  • @raihanrashid1378
    @raihanrashid1378 5 місяців тому

    The 128 times loop ig wasn't necessary you could have just shifted 1 bit 8 times and flipped that bit. So, 8 would be the inner loop count.

  • @morticiaaddams5013
    @morticiaaddams5013 5 місяців тому

    Bende ....Hiding-from-you yazıyor bunu nasıl çözebilirim

  • @carolinepeace819
    @carolinepeace819 5 місяців тому

    my payload attack won't work, my "request count" is 0 and i have no clue how to change it

    • @carolinepeace819
      @carolinepeace819 5 місяців тому

      and i followed step-by-step this video.. so if you have an idea i need it

  • @stefel7765
    @stefel7765 6 місяців тому

    only video/writeup that helped me understand this one, thanks a lot!

  • @cs06dhatchinamoorthy53
    @cs06dhatchinamoorthy53 6 місяців тому

    Thanks ;⁠)

  • @draconightwalker4964
    @draconightwalker4964 7 місяців тому

    thanks for this

  • @SaaimSherif
    @SaaimSherif 7 місяців тому

    This is excellent explanation. Kudos. Just one correction. @12:48, the ord() value of the second letter "i" is not changed to binary. Instead the binary value "0111000000000000" is converted back to decimal, which is "28672". Then they both are added and we get 28777. We then view it in hex, which is 7069^16 and the corresponding Japanese symbol. For anyone like me who's confused on the part where he adds both the binary values, here's the explanation. Thanks!

    • @mike_on_tech
      @mike_on_tech 6 місяців тому

      Appreciate the correction.

  • @naif5350
    @naif5350 7 місяців тому

    Man you’re really making things easier for me Thank you! I know I’m a little late but I can’t help but thank you for what you’re doing It’s truly amazing

  • @rdt777
    @rdt777 7 місяців тому

    why using static ?

  • @weijietan1178
    @weijietan1178 7 місяців тому

    thanks for giving such a detailed explanation

  • @yaserbit
    @yaserbit 7 місяців тому

    Great content man, I appreciate these videos

  • @_RevansiddappaDiggavi
    @_RevansiddappaDiggavi 7 місяців тому

    how did you come to know that its robots,=.txt file

    • @mike_on_tech
      @mike_on_tech 7 місяців тому

      This is one of those things that you learn once, then know to look for. Its a file that web crawlers read.

    • @trashdoc6920
      @trashdoc6920 4 місяці тому

      @@mike_on_tech but how did you know it was called Robots? Sorry this one is confusing to me

    • @trashdoc6920
      @trashdoc6920 4 місяці тому

      Never mind I see that its going to be called "robots.txt" in most cases lol. Thank you for the video!

  • @nicolaspanu7448
    @nicolaspanu7448 7 місяців тому

    Great content, many thanks!

  • @yaserbit
    @yaserbit 7 місяців тому

    I really appreciate these videos man, they're really helpful

  • @LeanBeefPattygoneDark
    @LeanBeefPattygoneDark 8 місяців тому

    Thank you ! I was stuck in this for a long time !! Love your in-depth explanation ❤

  • @weijietan1178
    @weijietan1178 8 місяців тому

    very detailed explanation thank you!

  • @weijietan1178
    @weijietan1178 8 місяців тому

    hey sir, thanks for another detailed and well explained walk through, i just started ctf so this challenge was quite challenging and took a toll on me. im always loving your videos keep it up!

    • @mike_on_tech
      @mike_on_tech 8 місяців тому

      Awesome, thanks for letting me know. Always makes my day to see comments like these!

  • @weijietan1178
    @weijietan1178 8 місяців тому

    i have learnt so much again thank to you sir!

  • @weijietan1178
    @weijietan1178 9 місяців тому

    best ctf tutor i love this channel!

    • @mike_on_tech
      @mike_on_tech 9 місяців тому

      Thanks! Comments like these make my day!

  • @SoBatistaCyber
    @SoBatistaCyber 9 місяців тому

    Hello Mike! I really enjoyed your video thank you very much for your content. On how to find what the flags mean, I was able to do that, though it took me ages. In this video: ua-cam.com/video/SSsBmJJkSL0/v-deo.htmlsi=7Kb7u5WfwnZ1sQap I talk about it. Feel free to take a look and once again great content! Cheers 😉

  • @pariskulkarni8113
    @pariskulkarni8113 9 місяців тому

    thx

  • @gokhantunay
    @gokhantunay 9 місяців тому

    asdkasmdolkmasod :D

  • @marammaloom
    @marammaloom 9 місяців тому

    thank you for explaining it thoroughly!

  • @sarpogartis
    @sarpogartis 9 місяців тому

    echo 'string_to_be_decoded' | base64 --decode

  • @loandy6841
    @loandy6841 9 місяців тому

    Thx!

  • @RogueMellow
    @RogueMellow 10 місяців тому

    bro im unable to enter the cipher text but i can enter the modulus and e values

  • @mrspeedy86
    @mrspeedy86 10 місяців тому

    so hard but 3000 view lol

  • @vaibhavsuri2389
    @vaibhavsuri2389 10 місяців тому

    udp contains pico is not working

  • @addisonm.2685
    @addisonm.2685 11 місяців тому

    Thanks you, I’ve been working through all of these using your walk throughs and learning about each one

  • @westramey7235
    @westramey7235 11 місяців тому

    Man! I owe you a case of beer or a nice dinner for you and your family. Dear lord the TLS dissectors section is so misleading. Who at Wireshark likes to do their work writing in ALL CAPS when it only accepts lowercase? That bugged me for hours and it didn't make any sense. Thank you truly! So much. That was driving me mad and making me feel dump. This helped so much.

    • @mike_on_tech
      @mike_on_tech 11 місяців тому

      Thanks, glad to help. Have a good new year!

  • @phan5302
    @phan5302 11 місяців тому

    Okay, this was a fun one

  • @68-pratikhanjagikar4
    @68-pratikhanjagikar4 11 місяців тому

    U are awesome bro❤

  • @tpt_transparent5179
    @tpt_transparent5179 11 місяців тому

    for some reason my gave me Errors No payload positions defined. anyone out there that could help

  • @robindiamondhands6416
    @robindiamondhands6416 11 місяців тому

    I decided to do some picoCTFs.. I was a bit disappointed by the brute force method.. I was thinking-- it cant possibly be pick and guess.. but sure enough.. I don't know much about python.. so I guess I am happy with this more in depth tutorial. This has been the worst picoCTF I've done so far, but mostly because I had to brute force it

    • @r4iden_
      @r4iden_ 10 місяців тому

      Brute force it with a script 🤦🏿‍♂️

    • @r4iden_
      @r4iden_ 10 місяців тому

      You do know you don't have to do it manually right u can change the python program to give the flag directly

  • @nhathai416
    @nhathai416 11 місяців тому

    how they know it is bitflip?

  • @duchuy.it97
    @duchuy.it97 Рік тому

    haha I love the way he explain 😄

  • @mudisabahahmad6139
    @mudisabahahmad6139 Рік тому

    by far the worst youtube tutorial i have seen on this. why even help

  • @db5094
    @db5094 Рік тому

    Thank you

  • @MidnightWill_
    @MidnightWill_ Рік тому

    /usr/bin/python: can't find '__main__' module in what does that mean

  • @nerdgammer3073
    @nerdgammer3073 Рік тому

    anyone who is trying the above challenge take a note that --unicpher no more exists it is --decrypt ......... just run the python3 "scriptname" to see the help manpage

  • @steezwhiteland7884
    @steezwhiteland7884 Рік тому

    reversing the flag code isnt working for me for some reason.