Angstrom CTF 2022 - Challenge Walkthroughs

Поділитися
Вставка
  • Опубліковано 9 лют 2025

КОМЕНТАРІ • 38

  • @georgmc
    @georgmc 2 роки тому +8

    I really appreciate that u're explaining the "small" stuff too and not just running through it and expecting ppl to already know what certain commands do and so on, thank you for these videos

  • @tednoob
    @tednoob 2 роки тому +3

    Your vides are very good! I have only seen a few but you're very straight forward and to the point, yet not skipping the details.

  • @mr.midnight7423
    @mr.midnight7423 Рік тому +3

    Nicely explained ❤

  • @kuza1625
    @kuza1625 2 роки тому +3

    great video bro! Btw would u upload video about the Cyber Apocalypse CTF 2022 on HTB?

    • @_CryptoCat
      @_CryptoCat  2 роки тому

      Unfortunately not mate! Been over in England the past week visiting family and missed the comp 😑

  • @Sh3lld0n
    @Sh3lld0n 2 роки тому +2

    AWESOME VIDEO. KEEP IT UP BROO👍🏻✊🏻✊🏻

    • @_CryptoCat
      @_CryptoCat  2 роки тому

      thanks bro 🙏

    • @Sh3lld0n
      @Sh3lld0n 2 роки тому +1

      @@_CryptoCat I want to ask you about pop rsi and pop rdi. Why we should override pop rdi firstly? Can we override firstly pop rsi?
      And what differences between pop rsi and pop rdi?
      Thank you!

    • @_CryptoCat
      @_CryptoCat  2 роки тому +1

      You could populate the RSI register before the RDI if you want. The important thing is that all the required registers are populated before a function is called.
      As for the difference; it's just calling convention, i.e. when a function in a 64-bit program is called, it will look for the parameters in RDI, RSI, RDX, RCX, R8, R9 and will return it's value to the RAX.
      If the function only takes one parameter, it should be popped into the RDI, before the function is called. If the function takes two params, the second should be popped into the RSI etc..
      You can highlight functions in ghidra to check what parameters they take and it will actually show the registers those params will be read from 😉

  • @S2eedGH
    @S2eedGH 2 роки тому +1

    YOU ARE A LEGEND

  • @sparrowgamingl6200
    @sparrowgamingl6200 2 роки тому +2

    awesome video

  • @AidinNaserifard
    @AidinNaserifard 2 роки тому +3

    amazing video bro👊👊 thanks for sharing

  • @_techwaves
    @_techwaves 2 роки тому +2

    Great video 🔥

  • @StevenHokins
    @StevenHokins 2 роки тому +2

    Good job! Thank you for videos

  • @0xarun
    @0xarun 2 роки тому +1

    Great vid man thanks for sharing ❤️💯

  • @saketsrv9068
    @saketsrv9068 2 роки тому +2

    Thank you master

  • @OtolKhan
    @OtolKhan 2 роки тому +2

    can whatsmyname solve using 'off by one' technique?

    • @_CryptoCat
      @_CryptoCat  2 роки тому

      My teammate was thinking it could be solved by leaking the name, i.e. enter 48 chars to overwrite the null terminator, so both variables will be printed but he didn't get it working.
      I remembered a similar challenge from last year and thought brute-forcing for random null byte was intended, interested to see some other solutions though 😊

    • @OtolKhan
      @OtolKhan 2 роки тому +1

      @@_CryptoCat yeah we tried that. Leaked the value but sending it doesnt work, dont know why!

  • @tg7943
    @tg7943 2 роки тому +2

    Push!

  • @MelisaMadenoglu
    @MelisaMadenoglu 2 роки тому +1

    you honestly deserve more views lmao

  • @DheerajKumar-kh1sl
    @DheerajKumar-kh1sl 2 роки тому +1

    pls make series on smart contract bug hunting.

    • @_CryptoCat
      @_CryptoCat  2 роки тому

      tbh it's not something i'm particularly familiar with. LiveOverflow has done some videos on it though 😉

  • @walidantaki3026
    @walidantaki3026 2 роки тому +1

    thanks man

  • @0xgodson119
    @0xgodson119 2 роки тому +2

    💫