Unpacking UPX Binaries (PicoCTF 2022 #51 'unpackme')

แชร์
ฝัง
  • เผยแพร่เมื่อ 19 พ.ค. 2022
  • Help the channel grow with a Like, Comment, & Subscribe!
    ❤️ Support ➡ j-h.io/patreon ↔ j-h.io/paypal ↔ j-h.io/buymeacoffee
    Check out the affiliates below for more free or discounted learning!
    🖥️ Zero-Point Security ➡ Certified Red Team Operator j-h.io/crto
    💻Zero-Point Security ➡ C2 Development with C# j-h.io/c2dev
    👨🏻‍💻7aSecurity ➡ Hacking Courses & Pentesting j-h.io/7asecurity
    📗Humble Bundle ➡ j-h.io/humblebundle
    🐶Snyk ➡ j-h.io/snyk
    🌎Follow me! ➡ j-h.io/discord ↔ j-h.io/twitter ↔ j-h.io/linkedin ↔ j-h.io/instagram ↔ j-h.io/tiktok
    📧Contact me! (I may be very slow to respond or completely unable to)
    🤝Sponsorship Inquiries ➡ j-h.io/sponsorship
    🚩 CTF Hosting Requests ➡ j-h.io/ctf
    🎤 Speaking Requests ➡ j-h.io/speaking
    💥 Malware Submission ➡ j-h.io/malware
    ❓ Everything Else ➡ j-h.io/etc

ความคิดเห็น • 31

  • @chrisbdaemon
    @chrisbdaemon 2 ปีที่แล้ว +19

    If you right click the hex value in Ghidra you can tell it to show the value in decimal instead of going to python for it

    • @skolarii
      @skolarii 2 ปีที่แล้ว +3

      i feel like sometimes he unnecessarily complicates it on purpose

  • @viv_2489
    @viv_2489 2 ปีที่แล้ว +4

    This is awesome library of Pico CTF that you are creating...thanks John

  • @comradedad
    @comradedad 2 ปีที่แล้ว

    Thank you John! I always learn so much watching your videos.

  • @wimnanoe5887
    @wimnanoe5887 2 ปีที่แล้ว +1

    Thank you John

  • @LDowning0190
    @LDowning0190 2 ปีที่แล้ว

    Thank you as always. See you next time.

  • @eavi4645
    @eavi4645 2 ปีที่แล้ว +1

    Awsome video! Thank you.

  • @abrobotics4976
    @abrobotics4976 ปีที่แล้ว +1

    Thanks John for all these information. I followed all the picoCTF challenges with you and succeeded to solve almost all of them except two of them. It was an amazing journey and suspected that you'll finish pico CTF 2022 challenges and I don't know why you stopped finishing them as there are only few remaining. Anyway I learned a lot of new things as I was a developer and stopped many years ago but restarted lately diving in coding universe again. I will follow your videos on Hack the box and try hack me as it's always a lot of fun and new Technics to learn from you. I like also your method almost like if you're doing it live.

  • @mostly_happy4248
    @mostly_happy4248 2 ปีที่แล้ว +1

    Great video, nice job!

  • @rodriquh
    @rodriquh 2 ปีที่แล้ว

    Thanks for showing me UPX, that’s a neat tool.

  • @shavonne4831
    @shavonne4831 2 ปีที่แล้ว

    I’m so glad I found your channel

  • @ChanKe
    @ChanKe 2 ปีที่แล้ว

    Hey thanks John!

  • @hedgechasing
    @hedgechasing ปีที่แล้ว +2

    What happened to this series? Would love to see the rest of the challenges if you filmed them. Even if you just want to make them unlisted and only available from the picoCTF playlist (if they don’t do well when uploaded standalone)

  • @-___-g
    @-___-g 2 ปีที่แล้ว

    You’ve posted so many videos lately I haven’t I had the time to watch them. Hopefully you’ll continue to post videos so I can binge watch them one of these weekend.

  • @debarghyadasgupta1931
    @debarghyadasgupta1931 2 ปีที่แล้ว

    Loved it 😇🙏😍

  • @redfoxymoon
    @redfoxymoon 2 ปีที่แล้ว

    UPX is used for compression, it doesn't do any protection or obfuscation... you can mess w/ the packed binary enough so that the normal UPX decompressor won't work on it anymore but it's not exactly hard to beat even then.

  • @electromods
    @electromods 2 ปีที่แล้ว

    Great!

  • @eloyam9973
    @eloyam9973 ปีที่แล้ว

    Very interesting

  • @taponplaza
    @taponplaza ปีที่แล้ว

    Hi Jhon just wondering when is the next video of this awesome series.

  • @-wilson-
    @-wilson- 2 ปีที่แล้ว

    good job

  • @OBSESSED1954
    @OBSESSED1954 2 ปีที่แล้ว

    John I am a big fan. Last night my neighbor was able to connect to my jobless 3.1 sound bar system via Bluetooth and had no access to the remote to pair to his device. I was up until 3 am pouring over the printed manual online. How is this possible and what can I do?

  • @shivamsiyani3991
    @shivamsiyani3991 2 ปีที่แล้ว +1

    Man love ur content and I want to Master it how can I master in binary stuffs

  • @romanburczymorda4313
    @romanburczymorda4313 2 ปีที่แล้ว

    in the loop? increment input? : D it's only fast

  • @vignesh8467
    @vignesh8467 2 ปีที่แล้ว +1

    ❤❤❤❤❤❤

  • @guilherme5094
    @guilherme5094 2 ปีที่แล้ว

    👍

  • @MyAngelMahiru
    @MyAngelMahiru 2 ปีที่แล้ว

    Noice

  • @hinogmo8861
    @hinogmo8861 2 ปีที่แล้ว

    Sir remember me CHESTER ☺️☺️ plz reply me sir 🥺

  • @ziil7525
    @ziil7525 ปีที่แล้ว

    this is not Unpacking UPX Binaries in reverse enginnering, it only use upx -d command.

  • @wilderness8022
    @wilderness8022 2 ปีที่แล้ว

    Hey new viewer here. I loved this video! I am trying to get into cybersecurity as a programmer currently and this kind of content is exactly what Im looking for to watch while teaching myself. One note though, please talk a little slower. This was such a great video for how to think through this kind of problem but I had to watch it twice to fully understand every step you took. Again, love the content and will continue to watch!

    • @skolarii
      @skolarii 2 ปีที่แล้ว

      keep at it Wilder. we were all there at some point. soon you'll find his pace isn't too quick to follow. until then, give it multiple tries if u need.

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 11 หลายเดือนก่อน

    Chhota explained 2prt