GuidePoint Security CTF - Custom Base64 Languages - Kirby & Alphabet

Поділитися
Вставка
  • Опубліковано 19 лис 2024

КОМЕНТАРІ • 116

  • @-mau
    @-mau 3 роки тому +71

    Instead of typing print(f"our_alphabet = {our_alphabet}") you could use this syntax instead: print(f"{our_alphabet=}"). Love your videos, keep it up! ❤️

    • @_JohnHammond
      @_JohnHammond  3 роки тому +22

      HOLY CRAP. I had no idea that was a thing. That is so awesome, thank you!!!

    • @TheJobCompany
      @TheJobCompany 3 роки тому +1

      @@_JohnHammond makes sense, that was added in python3.8

    • @cedricvillani8502
      @cedricvillani8502 3 роки тому

      You should explain boolean algebra, truth tables and karnaul maps. And include logic gates AND OR NOT XOR bla bla etc.. I would also say base2 to base6 to base10 , but probably too much for one video

    • @smaa01
      @smaa01 3 роки тому +1

      f string ❤

    • @sujatapanigrahy7172
      @sujatapanigrahy7172 3 роки тому

      Import Viewer
      Video.append(f"{silence.play()}...{silence.stop()}hey everybody, my name is John Hammond")
      Viewer.heartattack()
      Video.append(f"{rest of the video}")

  • @mrjoeymelo
    @mrjoeymelo 3 роки тому +35

    John: “You might already know the answer”
    Me: “googles what does #!/usr/bin/env means”

    • @jonny-mp3
      @jonny-mp3 3 роки тому +1

      what does it mean xD

    • @DHIRAL2908
      @DHIRAL2908 3 роки тому +6

      @@jonny-mp3 select the interpreter from the environment. Basically find the interpreter binary from PATH variables.

    • @benjamindavid4360
      @benjamindavid4360 3 роки тому +2

      thank you! i needed this comment :D

  • @kyay10
    @kyay10 3 роки тому +6

    I was screaming at the screen "just use an identity string!". As in, just run through all the bytes between 00000000 and 11111111, convert that to a string, send it, and you'll get out their key right away, which is practically what you did, but with like 5 levels of indirection lol

  • @thatcreole9913
    @thatcreole9913 3 роки тому +35

    I love this channel.

  • @matthewlandry1352
    @matthewlandry1352 3 роки тому

    You nail it every time John. (Even though you get nervous about it). Showcasing your METHODOLOGIES(including the rabbit holes helps the Noobs) is why I watch ALL your videos!

  • @anchorheavenonearth
    @anchorheavenonearth 3 роки тому

    John your CTF projects have been so informative and great fun to watch. This is helping shape the way to a more "outside of the box" way of tackling certain issues we may experience in the infosec pathway. (HTB pun intended)

  • @jht5225
    @jht5225 3 роки тому +1

    Stumbled onto your channel. Love your breaking apart of malware. Honestly you couldn’t make enough of it, so good

  • @jeremymadray1438
    @jeremymadray1438 3 роки тому

    I have no idea what's happening but it's really cool and I've been binging all of your videos. And honestly, with my limited programming knowledge, I am learning a lot! You're amazing bro!

  • @route_switch
    @route_switch 3 роки тому

    I really like seeing your thought process it really helps me to learn more. Thanks John

  • @NateRoberts
    @NateRoberts 3 роки тому

    I can’t say I really followed along with the Python at the end, BUT honestly it makes me feel better knowing that John struggled with it too the first time. Appreciate the content as always!

  • @fausto2328
    @fausto2328 3 роки тому

    man found your channel yesterday and I'm really liking thoses challanges, will start doing some in the weekend when I have free time, keep the great work

  • @48pluto
    @48pluto 3 роки тому

    Its nice to see the whole thought proces going on and learn from it. Thanks for the video.

  • @TheH2OWeb
    @TheH2OWeb 3 роки тому

    Your videos encourage me to try harder. Thank You !

  • @bladesvlogs4965
    @bladesvlogs4965 3 роки тому +1

    1 glass of wine while watching this and I kept up, but my brain was melting by the end :P

  • @James200319
    @James200319 3 роки тому +3

    Got me interested in joining THM and practicing my skills again

  • @MirekEndys
    @MirekEndys 3 роки тому +1

    Thats fun to watch your thinking processes 😂 Helps me to learn and shows me new ways Thanks 👊😎🤟

  • @padreigh
    @padreigh 2 роки тому

    With an transparent image (like this one) you could also encode stuff as colors and set them as opacity = 0 - essentialy hiding the information within the images fully transparent pixels.

  • @bla-skills
    @bla-skills 3 роки тому

    What an adventure, great content.
    Btw I think the trailing = are because you included them in your payload. It's for padding so their encoded message has to encode the padding char.

  • @watchdog2864
    @watchdog2864 3 роки тому

    I’ve been trying for so long to find how not to show the ‘connecting to host’ message. You’re a saviour.

  • @TheAyushbest1
    @TheAyushbest1 3 роки тому

    New videos coming on back to back!

  • @joelthomas4911
    @joelthomas4911 3 роки тому +1

    That intro was legendary!! 😂😂😂

  • @arctis_shark
    @arctis_shark 3 роки тому +5

    For the algorythm!!

  • @TracerPortable
    @TracerPortable 3 роки тому

    I need further explanation why decoded regular alphabet after encoding with custom alphabet returns that alphabet. Why this is working that way?

  • @BECSE-SSubiramaniyan
    @BECSE-SSubiramaniyan 3 роки тому +3

    John kindly tell about your windows privesec methodology
    #stress_full_windows-privesec🥺

  • @Daxiel-vk7wj
    @Daxiel-vk7wj 3 роки тому

    Was waiting for this! Thank you!

  • @deutschmitvkEins
    @deutschmitvkEins 3 роки тому

    Cool Guide, I probably have to re-watch it !!

  • @defyteryt2452
    @defyteryt2452 3 роки тому

    I love this person

  • @rdius4822
    @rdius4822 3 роки тому +3

    I clicked because of Kirby :)

    • @zwz.zdenek
      @zwz.zdenek 3 роки тому

      I stayed for the coding.

  • @LinuxSploitOfficial
    @LinuxSploitOfficial 3 роки тому +1

    Thanks

  • @aniketsharma7333
    @aniketsharma7333 3 роки тому +1

    CTF...long time 🥳

  • @dedkeny
    @dedkeny 3 роки тому +1

    Doing it for the almighty Algo

  • @patchbyte6856
    @patchbyte6856 3 роки тому +1

    thats gonna be good

  • @phantom_stnd
    @phantom_stnd 3 роки тому

    why do you import a library to use xor? does python don't have it by default?

  • @lewisstevens1
    @lewisstevens1 3 роки тому

    I miss playing with these things! Including hackthebox, but never get time nowadays!

  • @GeekBatman
    @GeekBatman 3 роки тому

    Jeez man!!! That jump scare right at the beginning!?!?! Not cool! 🤣

  • @tjokkerstar1462
    @tjokkerstar1462 3 роки тому

    Please use drak reader or something so i don't get flash banged whenever you go to google or Wikipedia :P Also nice video i was so lost with all the Alphabet stuff :P

  • @babakfp
    @babakfp 3 роки тому +2

    Hi John. Can use encode a Python .exe file with C++? I mean encode it to antiviruses couldn't recognize the app as malware :| Is there any documentation?

  • @bonus4uspace18
    @bonus4uspace18 3 роки тому

    Thank you so much

  • @jorgevilla6523
    @jorgevilla6523 3 роки тому

    haha what a intro appear from no where!!!

  • @flaviuscondurache2688
    @flaviuscondurache2688 3 роки тому

    Cool solution, though I think you could have use your original solution. You had your alphabet and your encoded string, that showed you the offset or the index in the alphabet, and their encoded string gave you what character should be at that offset or index. This means you could have rebuild the alphabet a letter at a time, though it’s not an elegant solution, I think it would have worked.

  • @renemertinsful
    @renemertinsful 3 роки тому +2

    Nice video
    Butt wouldn't it be much easier to directly send the bytes from 0 to FF as message? The result should be the used alphabet plus the equal sign. As I understand how base64 works.

    • @alexmeyer4598
      @alexmeyer4598 3 роки тому

      That's basically what he ended up doing, in a super roundabout way. By taking the normal base64 letters in order and decoding them, you'd just end up with bytes 00-FF.

    • @renemertinsful
      @renemertinsful 3 роки тому

      @@alexmeyer4598 but my brain hurts when I have to think this way. Bit shifting would be so much easier and more explaining

    • @alexmeyer4598
      @alexmeyer4598 3 роки тому +2

      @@renemertinsful oh for sure. Just sending the raw bytes 00-FF is way more straight-forward, and would actually demonstrate how base64 works in a very nice, visual way.
      I was trying not to yell at my screen when he started doing it this way. Lol. I think he was just overthinking the problem a little bit.

  • @Pharm8alin
    @Pharm8alin 3 роки тому

    This one is good and fun.

  • @doyk_rest
    @doyk_rest 3 роки тому

    whats that ending song ?

  • @rohitjadhav4868
    @rohitjadhav4868 3 роки тому

    How are you getting all this malware samples pleas tell

  • @RTCW-ET-MOVIES
    @RTCW-ET-MOVIES 3 роки тому

    A random John appears!

  • @SuperROFLWAFL
    @SuperROFLWAFL 3 роки тому +1

    Is 'tack' what a hyphen is called in the command line, or is this a Hammond'ism?

    • @PreetisKitchenltr
      @PreetisKitchenltr 3 роки тому +2

      Many People Call It Tack. You Can Also Call It Dash Or Hyphen...

    • @SuperROFLWAFL
      @SuperROFLWAFL 3 роки тому +1

      @@PreetisKitchenltr thank you!

  • @miza8421
    @miza8421 3 роки тому +1

    Hey John or others; How do you manage to access the CTF after the event is over? My vpn access no longer works since the ctf has terminated. Cheers I always love your videos

  • @0xff1337
    @0xff1337 3 роки тому +1

    Nice t-shirt 👌

  • @thengakola6217
    @thengakola6217 3 роки тому

    isnt decode() same as decode('utf-8') ?

  • @dekajulian7296
    @dekajulian7296 3 роки тому +1

    I really need a guide or book about python for CTF. I am always stuck with challenge that need python or other like bash etc

  • @InfoSecDojo
    @InfoSecDojo 3 роки тому +1

    i missed this CTF bcoz of my exams 😔😔

  • @PatrickAllenNL
    @PatrickAllenNL 3 роки тому

    Hi John, I watch your videos and have zero experience in this field, basic knowledge. I have a question,
    Is it possible to write some kind of virus or malicious program that sits on my network. Then when I get hacked or attacked it basically defends by frying the attackers CPU or anything like that. What would that look like?
    This is kind of a wet dream of mine, making the blackhats cry and die inside.

  • @omarkhalid2966
    @omarkhalid2966 3 роки тому

    Woooooow

  • @fordorth
    @fordorth 3 роки тому

    What were you doing down there John?

  • @ARZ10198
    @ARZ10198 3 роки тому +1

    Peculiar

  • @blade1551431
    @blade1551431 3 роки тому

    can u make a video on how to make VM and install all tools for CTF

  • @dsdgaming2242
    @dsdgaming2242 3 роки тому

    Is this machine you are working on the one that you recently build ?

  • @jhbonarius
    @jhbonarius 3 роки тому +6

    I had to rewatch the first 13 seconds of the video a number of times. What's happening with your mouth? Are you a vertriloquist (or however you spell that)?

    • @andrewferguson6901
      @andrewferguson6901 3 роки тому

      @@fdsafdsafdsafdsafd sometimes magic is more appealing

  • @castles990
    @castles990 3 роки тому +11

    👀

  • @sammo7877
    @sammo7877 3 роки тому +1

    you look tired in this video John :) great video as always though! keep them coming

  • @MultimediaCizzy
    @MultimediaCizzy 3 роки тому +1

    How is your vm running that smooth tho? Did you give it like exta graphics or 32 GB of RAM? What's the Host OS ?

    • @_JohnHammond
      @_JohnHammond  3 роки тому +1

      This rig has 64 GB of RAM, 28 TB storage, and 48 hyperthreaded cores. My wallet still hurts. Windows on the host in this case, and yeah like 16 GB of RAM or so for the guest.

    • @MultimediaCizzy
      @MultimediaCizzy 3 роки тому +1

      @@_JohnHammond damn bro, you gettin' kinda serious (⊙_⊙;) 😂😂

  • @SuperMarkusparkus
    @SuperMarkusparkus 3 роки тому

    Just send over the base64-decoded base64-alphabet to the server and get the answer back.

  • @mr.lineleaf8111
    @mr.lineleaf8111 3 роки тому

    Nah man, show us every thing
    I like to see the thought process

  • @mdiaz2111
    @mdiaz2111 3 роки тому

    Does he have ubuntu or kali im alittle confused does ubuntu have pen tools ?

    • @_JohnHammond
      @_JohnHammond  3 роки тому

      I'm using Ubuntu. You can install any tools you'd like :)

  • @N4dirCh
    @N4dirCh 3 роки тому

    wow

  • @blade1551431
    @blade1551431 3 роки тому

    do you complete CTF-s before recording?

  • @frostburns4029
    @frostburns4029 3 роки тому +1

    18:12's in Try English.

  • @enhboldotgonbaatar248
    @enhboldotgonbaatar248 3 роки тому

    hONNjAMMOND

  • @andmo90
    @andmo90 3 роки тому

    WHERE DID YOU COME FROM??!

  • @squeelyinc
    @squeelyinc 3 роки тому

    I need to get involved in python

  • @sujatapanigrahy7172
    @sujatapanigrahy7172 3 роки тому

    Import Viewer
    Video.append(f"{silence.play()}...{silence.stop()}hey everybody, my name is John Hammond")
    Viewer.heartattack()
    Video.append(f"{rest of the video}")

  • @dardrax
    @dardrax 3 роки тому +1

    Hehe

  • @jhhi7223
    @jhhi7223 3 роки тому

    Hi

  • @cedricvillani8502
    @cedricvillani8502 3 роки тому

    More like Kirby sucked up the flag. This comment is sponsored by LastPass