FUNTECH HUB
FUNTECH HUB
  • 27
  • 1 733
PicoCTF Heap 0
Description
Heap 0
Binary Exploitation
Are overflows just a stack concern?
Download Binary and Source Files Here
Additional details will be available after launching your challenge instance.
Переглядів: 95

Відео

PicoCTF Binary Search
Переглядів 13921 день тому
Description Want to play a game? As you use more of the shell, you might be interested in how they work! Binary search is a classic algorithm used to quickly find an item in a sorted list. Can you find the flag? You'll have 1000 possibilities and only 10 guesses. Cyber security often has a huge amount of data to look through - from logs, vulnerability reports, and forensics. Practicing the fund...
General Skills in CTF s ll
Переглядів 43Місяць тому
General Skills in CTF s ll
General Skills in CTF s
Переглядів 189Місяць тому
Learn cybersecurity CTF's concept-by-concept. In this video, we consider number bases, encodings and the Shell. 00:00 - Part I, Numbers 19:14 - Problem Set I 19:43 - Part II, The Shell 48:50 - Problem Set II
Scan Surprise PicoCTF
Переглядів 57Місяць тому
Description I've gotten bored of handing out flags as text. Wouldn't it be cool if they were an image instead? You can download the challenge files here
PicoCTF Verify
Переглядів 182Місяць тому
Description People keep trying to trick my players with imitation flags. I want to make sure they get the real thing! I'm going to provide the SHA-256 hash and a decrypt script to help you know that my flags are legitimate. You can download the challenge files here Additional details will be available after launching your challenge instance.
Hashing Job App - PicoCTF
Переглядів 786 місяців тому
Description If you want to hash with the best, beat this test! Additional details will be available after launching your challenge instance.
Glitch Cat CTF
Переглядів 387 місяців тому
Glitch Cat AUTHOR: LT 'SYREAL' JONES Description Our flag printing service has started glitching Hints 1. ASCII is one of the most common encodings used in programming 2. We know that the glitch output is valid Python, somehow! 3. Press Ctrl and c on your keyboard to close your connection and return to the command prompt.
Fixme2 General Skill CTF
Переглядів 498 місяців тому
Description Fix the syntax error in the Python script to print the flag. Hints: 1. Are equality and assignment the same symbol? 2. To view the file in the webshell, do: $ nano fixme2.py 3. To exit nano, press Ctrl and x and follow the on-screen prompts. 4. The str_xor function does not need to be reverse engineered for this challenge.
Fixme1 - General Skill CTF
Переглядів 398 місяців тому
Description Fix the syntax error in this Python script to print the flag. Hints 1. Indentation is very meaningful in Python 2. To view the file in the webshell, do: $ nano fixme1.py 3. To exit nano, press Ctrl and x and follow the on-screen prompts. 4. The str_xor function does not need to be reverse engineered for this challenge.
Advanced Potion Making BGM only, No Commentary
Переглядів 329 місяців тому
Advanced-Potion-Making Forensics Description Ron just found his own copy of advanced potion making, but its been corrupted by some kind of spell. Help him recover it!
Login Web Exploitation
Переглядів 269 місяців тому
Description My dog-sitter's brother made this website but I can't get in; can you help? login.mars.picoctf.net
Convertme.py General Skill
Переглядів 2510 місяців тому
Description Run the Python script and convert the given number from decimal to binary to get the flag. Download Python script Hints 1. Look up a decimal to binary number conversion app on the web or use your computer's calculator! 2. The str_xor function does not need to be reverse engineered for this challenge. 3. If you have Python on your computer, you can download the script normally and ru...
Codebook General Skill
Переглядів 2410 місяців тому
Description Run the Python script code.py in the same directory as codebook.txt. Hints 1. On the webshell, use ls to see if both files are in the directory you are in 2. The str_xor function does not need to be reverse engineered for this challenge.
Unsubscriptions Are Free "Binary Exploitation"
Переглядів 2410 місяців тому
Check out my new video-game and spaghetti-eating streaming channel on Twixer! program and get a flag. Hints: homes.sice.indiana.edu/yh33/Teaching/I433-2016/lec13-HeapAttacks.pdf
Hurry up wait ! Reverse Engineering Flag
Переглядів 42511 місяців тому
Hurry up wait ! Reverse Engineering Flag
Linux APT Vulnerabilities Avoid
Переглядів 1911 місяців тому
Linux APT Vulnerabilities Avoid
Who Are You
Переглядів 27Рік тому
Who Are You
Wireshark twoo twooo two twoo
Переглядів 30Рік тому
Wireshark twoo twooo two twoo
Like Share & Subscribe to My Channel FunTechHub
Переглядів 24Рік тому
Like Share & Subscribe to My Channel FunTechHub
Bug Bounty Tutorial for Beginners How to Become bug Bounty Hunter Step By Step
Переглядів 24Рік тому
Bug Bounty Tutorial for Beginners How to Become bug Bounty Hunter Step By Step
Bug Crowd Basics Information Disclosure "Bug Bounty"
Переглядів 35Рік тому
Bug Crowd Basics Information Disclosure "Bug Bounty"
Penetration Testing Tutorial Penetration Testing Tools Cyber Security Training
Переглядів 22Рік тому
Penetration Testing Tutorial Penetration Testing Tools Cyber Security Training
Working With DOS, Quick peek of Dos in CLI to GUI
Переглядів 18Рік тому
Working With DOS, Quick peek of Dos in CLI to GUI
Password Bruteforcing
Переглядів 312 роки тому
Password Bruteforcing
Installing & Configuring Jenkins
Переглядів 132 роки тому
Installing & Configuring Jenkins
Game of Hack
Переглядів 262 роки тому
Game of Hack

КОМЕНТАРІ

  • @malakai1623
    @malakai1623 11 місяців тому

    "promosm" 🔥

  • @maxmuster7003
    @maxmuster7003 Рік тому

    Good work.

  • @maxmuster7003
    @maxmuster7003 Рік тому

    I like to use batch files as a container for open source routines to create tiny executable files with a little help from Debug and i made some videos(no speech) to show how it works and to share the batch files. Most of these special batch files have to start with one or more parameter attached. Example: CENTER.BAT 8 1b "output center align". Have fun. 😊