Jason Scribner
Jason Scribner
  • 12
  • 5 450
Huntress CTF!!! Video 9: Baking VeeBeeEee, lolz2, Rogue Inbox
0:00 Intro and Video Statuses
6:00 Baking
13:26 VeeBeeEee
24:42 Lolz2
40:14 Rogue Inbox
57:22 Outro
มุมมอง: 20

วีดีโอ

Huntress CTF Part 7: Zerion!
มุมมอง 11ปีที่แล้ว
Tackling an easy peasy (but medium) challenge! 0:00 Intro and overview of the videos 02:12 Starting Zerion 03:54 Analyzing the code 06:40 De-Obfuscating code 08:30 Getting to the center of the code 09:45 Finding the Flag 11:15 Ending
Huntress CTF part 1
มุมมอง 151ปีที่แล้ว
Will include an overview of the operating platform I use, how to utilize the various tools at your disposal, going over the challenges' warmups. Timestamps: 0:00 Introduction, Hacking environment to use 7:40 Linode example 11:30 setting up forwarding ports for VNC connections 20:12 Start of challenges (Notepad, Read the Rules) 35:47 Technical Support and String Cheese Challenge 41:12 Book by it...
Huntress CTF Video 10!
มุมมอง 30ปีที่แล้ว
Challenges: Opposable thumbs, M three sixty five, and Land Before Time 0:00 Intro and Video status 04:10 Opposable Thumbs 11:14 M Three Sixty Five 26:54 Land Before Time
Huntress CTF Part 6: Traffic!
มุมมอง 21ปีที่แล้ว
Let's tackle the nuances of the Traffic Challenge! 0:00 Preparing RITA 07:22 Importing Data to RITA 09:30 Showing data with RITA 11:08 HTML Report 13:48 Analyzing possible IOCS 16:38 finding the flag 17:50 Easier method in finding the flag 21:45 Ending
Huntress CTF! Rock Paper Psychic!!!
มุมมอง 12ปีที่แล้ว
This is a breakdown video on how I broke Rock Paper Psychic. It's only one of possibly many many methods! 0:00 Intro and start 1:22 Program overview 2:55 Buffer overflow attempt and example 6:24 Static Analysis of the program 10:16 Example of Disassemblers 14:30 GHIDRA startup 16:45 Disassembling Rock Paper Psychic 32:06 Finding the Call to get the flag 34:03 Finding the method to break and mod...
Huntress CTF Part 5 - Backdoored Splunk, F12, Dumpster Fire and Wimble
มุมมอง 61ปีที่แล้ว
Going over some more shenanigans!!!!! 0:00 Brief Intro 02:00 Backdoored Splunk 16:06 Backdoor splunk - linux searching (fasterrrr) 17:58 F12 21:52 Dumpster Fire 33:33 Switching to Linux for Dumpster Fire 39:30 Decrypting Passwords for Dumpster Fire 43:22 Wimble 55:20 Installing PECmd for Wimble 1:02:30 Ending
Huntress CTF 4
มุมมอง 26ปีที่แล้ว
Lets continue tackling these challenges! 0:00 Updates on challenges and videos 3:45 Layered Security 07:50 Chicken Wings 13:18 Comprezz 24:40 Human2 41:10 Dialtone 46:05 python woes (you can skip!) 49:20 Continue Dialtone 56:41 Review
Huntress CTF Walkthrough #2: Hot off the Press
มุมมอง 27ปีที่แล้ว
Huntress CTF Walkthrough #2: Hot off the Press
Huntress CTF Part 3!!!!!
มุมมอง 9ปีที่แล้ว
0:00 Where am I? 3:45 PHP Stager 7:25 Breaking down the PHP file 31:27 Decoding the Payload 34:50 Breaking down the payload 35:40 Finding the final Payload 38:40 lolz#1 (first Impossible challenge) breakdown
JNDI log4j Vulnerability Exploit Use Example
มุมมอง 5K3 ปีที่แล้ว
In this video I will be demonstrating how the log4j vulnerability can be used with JNDI calls to an LDAP server. Credit goes to TryHackMe for hosting this room and for John Hammond who created the room. Room: tryhackme.com/room/solar

ความคิดเห็น

  • @sharon12223
    @sharon12223 ปีที่แล้ว

    very helpful. Thank you!

  • @d.-_-.b
    @d.-_-.b 3 ปีที่แล้ว

    I love how even though you knew the severity of this vulnerability beforehand, you still gasp/laughed when "ALL" shows up for which commands can be used on the compromised machine.