- 27
- 1 733
FUNTECH HUB
India
Приєднався 30 чер 2022
This channel provides step-by-step walkthroughs of various Capture the Flag challenges, helping viewers understand key cybersecurity concepts like cryptography, reverse engineering, web exploitation, and digital forensics. FunTech Hub offers educational content that simplifies advanced topics making it a valuable resource for students and enthusiasts looking to sharpen their skills in cybersecurity. Whether you're participating in PicoCTF or simply interested in improving your problem solving abilities in the cyber world, FunTech Hub delivers practical, hands-on solutions to help you succeed.
PicoCTF is an online cybersecurity competition designed for middle school, high school, and college students. Created by the security experts at "Carnegie Mellon University" picoCTF offers an educational platform through engaging challenges that introduce participants to fundamental cybersecurity concepts.
This channel is for educational purposes only. Please do not engage in Unethical conduct
PicoCTF is an online cybersecurity competition designed for middle school, high school, and college students. Created by the security experts at "Carnegie Mellon University" picoCTF offers an educational platform through engaging challenges that introduce participants to fundamental cybersecurity concepts.
This channel is for educational purposes only. Please do not engage in Unethical conduct
PicoCTF Heap 0
Description
Heap 0
Binary Exploitation
Are overflows just a stack concern?
Download Binary and Source Files Here
Additional details will be available after launching your challenge instance.
Heap 0
Binary Exploitation
Are overflows just a stack concern?
Download Binary and Source Files Here
Additional details will be available after launching your challenge instance.
Переглядів: 95
Відео
PicoCTF Binary Search
Переглядів 13921 день тому
Description Want to play a game? As you use more of the shell, you might be interested in how they work! Binary search is a classic algorithm used to quickly find an item in a sorted list. Can you find the flag? You'll have 1000 possibilities and only 10 guesses. Cyber security often has a huge amount of data to look through - from logs, vulnerability reports, and forensics. Practicing the fund...
General Skills in CTF s
Переглядів 189Місяць тому
Learn cybersecurity CTF's concept-by-concept. In this video, we consider number bases, encodings and the Shell. 00:00 - Part I, Numbers 19:14 - Problem Set I 19:43 - Part II, The Shell 48:50 - Problem Set II
Scan Surprise PicoCTF
Переглядів 57Місяць тому
Description I've gotten bored of handing out flags as text. Wouldn't it be cool if they were an image instead? You can download the challenge files here
PicoCTF Verify
Переглядів 182Місяць тому
Description People keep trying to trick my players with imitation flags. I want to make sure they get the real thing! I'm going to provide the SHA-256 hash and a decrypt script to help you know that my flags are legitimate. You can download the challenge files here Additional details will be available after launching your challenge instance.
Hashing Job App - PicoCTF
Переглядів 786 місяців тому
Description If you want to hash with the best, beat this test! Additional details will be available after launching your challenge instance.
Glitch Cat CTF
Переглядів 387 місяців тому
Glitch Cat AUTHOR: LT 'SYREAL' JONES Description Our flag printing service has started glitching Hints 1. ASCII is one of the most common encodings used in programming 2. We know that the glitch output is valid Python, somehow! 3. Press Ctrl and c on your keyboard to close your connection and return to the command prompt.
Fixme2 General Skill CTF
Переглядів 498 місяців тому
Description Fix the syntax error in the Python script to print the flag. Hints: 1. Are equality and assignment the same symbol? 2. To view the file in the webshell, do: $ nano fixme2.py 3. To exit nano, press Ctrl and x and follow the on-screen prompts. 4. The str_xor function does not need to be reverse engineered for this challenge.
Fixme1 - General Skill CTF
Переглядів 398 місяців тому
Description Fix the syntax error in this Python script to print the flag. Hints 1. Indentation is very meaningful in Python 2. To view the file in the webshell, do: $ nano fixme1.py 3. To exit nano, press Ctrl and x and follow the on-screen prompts. 4. The str_xor function does not need to be reverse engineered for this challenge.
Advanced Potion Making BGM only, No Commentary
Переглядів 329 місяців тому
Advanced-Potion-Making Forensics Description Ron just found his own copy of advanced potion making, but its been corrupted by some kind of spell. Help him recover it!
Login Web Exploitation
Переглядів 269 місяців тому
Description My dog-sitter's brother made this website but I can't get in; can you help? login.mars.picoctf.net
Convertme.py General Skill
Переглядів 2510 місяців тому
Description Run the Python script and convert the given number from decimal to binary to get the flag. Download Python script Hints 1. Look up a decimal to binary number conversion app on the web or use your computer's calculator! 2. The str_xor function does not need to be reverse engineered for this challenge. 3. If you have Python on your computer, you can download the script normally and ru...
Codebook General Skill
Переглядів 2410 місяців тому
Description Run the Python script code.py in the same directory as codebook.txt. Hints 1. On the webshell, use ls to see if both files are in the directory you are in 2. The str_xor function does not need to be reverse engineered for this challenge.
Unsubscriptions Are Free "Binary Exploitation"
Переглядів 2410 місяців тому
Check out my new video-game and spaghetti-eating streaming channel on Twixer! program and get a flag. Hints: homes.sice.indiana.edu/yh33/Teaching/I433-2016/lec13-HeapAttacks.pdf
Hurry up wait ! Reverse Engineering Flag
Переглядів 42511 місяців тому
Hurry up wait ! Reverse Engineering Flag
Like Share & Subscribe to My Channel FunTechHub
Переглядів 24Рік тому
Like Share & Subscribe to My Channel FunTechHub
Bug Bounty Tutorial for Beginners How to Become bug Bounty Hunter Step By Step
Переглядів 24Рік тому
Bug Bounty Tutorial for Beginners How to Become bug Bounty Hunter Step By Step
Bug Crowd Basics Information Disclosure "Bug Bounty"
Переглядів 35Рік тому
Bug Crowd Basics Information Disclosure "Bug Bounty"
Penetration Testing Tutorial Penetration Testing Tools Cyber Security Training
Переглядів 22Рік тому
Penetration Testing Tutorial Penetration Testing Tools Cyber Security Training
Working With DOS, Quick peek of Dos in CLI to GUI
Переглядів 18Рік тому
Working With DOS, Quick peek of Dos in CLI to GUI
"promosm" 🔥
Good work.
I like to use batch files as a container for open source routines to create tiny executable files with a little help from Debug and i made some videos(no speech) to show how it works and to share the batch files. Most of these special batch files have to start with one or more parameter attached. Example: CENTER.BAT 8 1b "output center align". Have fun. 😊