Ciphers are incredibly common in cryptography, it's just that they're usually combined with multiple other methods to further obfuscate the data. NES games used bitshifting and XOR in their passwords, for example. With a simple substitution cipher, to show the player the resulting data in a human-readable way. So, it could be written down, for later.
Doesn't presume the viewer to be an idiot or a genius or fill the videos with fluff. It's hard to find anything like it. I learn more about python watching him dissect it in one video than anything else in several
It's in one of the first picoctf videos. There was some easy challenge and time left so he created 2 scripts in bash. I think the save script saves the flag in flag.txt, if I remember correct , and finish adds _COMPLETED to the the directory name so you know the challenge is completed. You don't need those scripts to finish a challenge, they are his own quality-of-life scripts. But you'll learn some scripting watching this video
I was such a dumb guy, instead of python replacing all the strings what i did was print the index and value of that 'a' string and i manually found and replaced it. Such a dumb way to do it.
It seems to me, that approximately 99.999% of the Python Code i get or see looks like the obfuscated CTF-File. And always this is just the pythonic way to do things. With loads of comments like "// get np for xxx" because everyone knows that np means numpy, right? Anyway.... i like Python as a Programming language... most programming styles of this language i strongly dislike. Also: nice video
It’s “how do they look” or “what do they look like.” Not “how do they look like.” That’s an English mistake that foreigners make, and that now native English speakers are starting to become corrupted by.
I love how this challenge was easy to me just because of all your malware analysis vids
replacing characters is so basic, this should not even count as "obfuscated" 😅
Ciphers are incredibly common in cryptography, it's just that they're usually combined with multiple other methods to further obfuscate the data.
NES games used bitshifting and XOR in their passwords, for example.
With a simple substitution cipher, to show the player the resulting data in a human-readable way. So, it could be written down, for later.
I love your content John you give me a new perspective on how to look at problems. Thank you.
Doesn't presume the viewer to be an idiot or a genius or fill the videos with fluff. It's hard to find anything like it. I learn more about python watching him dissect it in one video than anything else in several
Brilliant move using a python instance to translate, new to CTFs but I’ll be trying that in the future for sure
great content John, this challenges are really great to learn every time something new. When a new malware-analysis video will come out?
Dude, your face structure deserves some chops, no cap xD
Great content as always my dude
This video looks like it will be scary to people that have never programmed but look absolutely easy for people with basic understanding
Internet security is so broad that what is easy for 1000 is difficult for 1 and vice versa
You make it look so easy 👍
love the content
Thanks for sharing...
Great content!!
Too many great videos unleashed
🌷❤️ Great content
thanks for sharing
What is the purpose of the save and finish commands?
It's in one of the first picoctf videos. There was some easy challenge and time left so he created 2 scripts in bash. I think the save script saves the flag in flag.txt, if I remember correct , and finish adds _COMPLETED to the the directory name so you know the challenge is completed. You don't need those scripts to finish a challenge, they are his own quality-of-life scripts. But you'll learn some scripting watching this video
Btw there is more than just an xor happening in the decryption algorithm.
Sir… can we de-obfuscate python PyArmor
Lovely
I was such a dumb guy, instead of python replacing all the strings what i did was print the index and value of that 'a' string and i manually found and replaced it.
Such a dumb way to do it.
Cant just one run the obfuscated python file?
Niceeeeeeeeeee
Great
Cool
First comment and like
bruh this isnt even obfuscation. I'd like to see you reverse a custom vm written in pure python
Bro i was scrolling through coments and didn't expect to find federal
someone got this for pyarmor?
Ki dra file using coffee to paste and coming for you code minchin attend I know I see it for you this file work is very easy
Has Ed Sheeran changed his profession?
Music is just his side gig
👍
A good video but your solution was way overkill. Could have just returned true in arg133() that had the obvious check in it.
It seems to me, that approximately 99.999% of the Python Code i get or see looks like the obfuscated CTF-File.
And always this is just the pythonic way to do things.
With loads of comments like "// get np for xxx" because everyone knows that np means numpy, right?
Anyway.... i like Python as a Programming language... most programming styles of this language i strongly dislike.
Also: nice video
Red flags
But not view
Hi
i'm no coder lol but i've deobfuscated worse stuff haha.
Haha Python -_-
It’s “how do they look” or “what do they look like.” Not “how do they look like.” That’s an English mistake that foreigners make, and that now native English speakers are starting to become corrupted by.