Steganography (1/2) BsidesCT CTF 2018

แชร์
ฝัง
  • เผยแพร่เมื่อ 4 พ.ย. 2018
  • If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
    E-mail: johnhammond010@gmail.com
    PayPal: paypal.me/johnhammond010
    GitHub: github.com/JohnHammond
    Site: www.johnhammond.org
    Twitter: / _johnhammond

ความคิดเห็น • 43

  • @Nikandlv
    @Nikandlv 5 ปีที่แล้ว +15

    Glad to found this channel ! I really enjoy these ctfs.
    Im a fullstack programmer and love reverse engineering and cracking stuff, security and playing around.
    Keep up the good work !

  • @rakshitawasthi6647
    @rakshitawasthi6647 3 ปีที่แล้ว

    This channel made me able to solve various challenges in CTFs. Thank you so much.

  • @CameronKalegi
    @CameronKalegi 5 ปีที่แล้ว +4

    Awesome - tactics and tools alone are helpful, but understanding what you're looking for really makes for valuable content. Keep up the great work!

    • @_JohnHammond
      @_JohnHammond  5 ปีที่แล้ว

      Thank you so much, will do! :D

  • @mcawalid549
    @mcawalid549 5 ปีที่แล้ว +3

    Awesome
    I learn many new things , thank you

  • @HamadCyber
    @HamadCyber ปีที่แล้ว

    Always a great fan of your content

  • @solidpain9098
    @solidpain9098 4 ปีที่แล้ว +5

    My steg skills just doubled from one vid. Awesome work!!!

    • @_JohnHammond
      @_JohnHammond  4 ปีที่แล้ว +1

      Very happy to hear that! Thanks so much for watching!

  • @guitaekm
    @guitaekm 11 หลายเดือนก่อน

    Thank you much, exactly what I needed

  • @andrewalonsi
    @andrewalonsi 5 ปีที่แล้ว +2

    I've known about CTF's for a while and it's really cool to see how it's done!

    • @_JohnHammond
      @_JohnHammond  5 ปีที่แล้ว +1

      Have you played? Thanks for watching!

    • @andrewalonsi
      @andrewalonsi 5 ปีที่แล้ว +2

      @@_JohnHammond I have not...YET I'm still learning independently, barely a script kiddie, but watching hacks and there implications are always fascinating to me :)

    • @_JohnHammond
      @_JohnHammond  5 ปีที่แล้ว +2

      @@andrewalonsi You just gotta jump in! I am still a script kiddie too ahaha. Thanks again for watching!

    • @andrewalonsi
      @andrewalonsi 5 ปีที่แล้ว

      Thank You for the fun and cool content! Looking forward to seeing more of your videos :D

  • @vibheeshavelayudha1903
    @vibheeshavelayudha1903 5 ปีที่แล้ว +2

    Learnt a lot of steg stuff today....

  • @Jayrprez
    @Jayrprez 3 ปีที่แล้ว

    Awesome video where can we find some of these challenges

  • @thirafinajwan
    @thirafinajwan 4 ปีที่แล้ว

    Uhm, noob question, soo, after i extracted an image with binwalk, i got file with a description "LRZIP compressed data - version 108.215".
    However, when i checked the official github page for lrzip, the latest version was 0.631 and last updated in 2016, what did i miss here? Thank you, great video btw.

  • @rubamelhem8617
    @rubamelhem8617 2 ปีที่แล้ว

    I want the link of these challenges please !
    I can't find them

  • @user-cl8mp2dp2k
    @user-cl8mp2dp2k ปีที่แล้ว +1

    What app is this ? The red one at 0:45

  • @osamaal-sharif7986
    @osamaal-sharif7986 4 ปีที่แล้ว

    actually iam glad to work on the website that you worked on .... but i found trouble to open it .... can any one tell me why.

  • @ome.mishra
    @ome.mishra 5 ปีที่แล้ว

    how to get those things you have downloaded can you give us

  • @i_got_worms7106
    @i_got_worms7106 5 ปีที่แล้ว +4

    I would love you to do a tutorial on how to create these puzzles from scratch. The hidden text that's visible using stegsolve, how to put that binary string into a .jpg file and into an image alpha channel etc... Preferably using GIMP and any other Linux derived software...

    • @_JohnHammond
      @_JohnHammond  5 ปีที่แล้ว +6

      I can certainly make this happen. I planned to recreate the Account Takeover challenges from the Web category, but I can definitely do these as well. Thanks for the great idea, and thanks for watching! :D

    • @ko-Daegu
      @ko-Daegu 5 ปีที่แล้ว

      sneaking_ weasel
      You can someone explain the command he write after he complete a CTF
      mv {,Complete}
      What does that mean ???

  • @wime365
    @wime365 4 ปีที่แล้ว

    i want to get these pictures,where can i find them?

  • @ko-Daegu
    @ko-Daegu 5 ปีที่แล้ว +2

    You can someone explain the command he write after he complete a CTF
    mv {,Complete}
    What does that mean ???

    • @_JohnHammond
      @_JohnHammond  5 ปีที่แล้ว +1

      I am just renaming the folder, and adding on "COMPLETE" at the very end. I use the braces as just quick shorthand so I don't have to repeat the filename. It's just "marking the challenge complete" so I know in the future that I solved that one :D Thank you so much for watching!

    • @ko-Daegu
      @ko-Daegu 5 ปีที่แล้ว

      John Hammond
      Thankx for the replay
      But wanna know how the terminal will know what file you are talking about
      mv {, complete}
      Doesn’t exactly tells what file we should use ....

  • @Jayrprez
    @Jayrprez 4 ปีที่แล้ว

    This is awesome

    • @_JohnHammond
      @_JohnHammond  4 ปีที่แล้ว

      Sounds like these are resurfacing at this years BsidesCT! I hope it helps! :D

  • @phanesoaks
    @phanesoaks 5 วันที่ผ่านมา

    Awesome I have no clue what your doing lol

  • @nostalgiccringeallhailchel3881
    @nostalgiccringeallhailchel3881 ปีที่แล้ว

    3:00 steg solve

  • @gajrajsingh51
    @gajrajsingh51 4 ปีที่แล้ว

    Why did you strip the L in the first challenge ?

    • @_JohnHammond
      @_JohnHammond  4 ปีที่แล้ว +2

      L isn't a valid hexadecimal character, hex is only 0-9a-f, so I remove that so the binascii.unhexlify or .decode('hex') -- the latter being the old, now dead and unsupported Python 2 rendition -- will work without an issue. If you don't remove the L, it will error as that is a non-valid hex character. Thanks for watching!

  • @Ruhgtfo
    @Ruhgtfo 4 ปีที่แล้ว

    sounds like Radbrad

  • @slaxblake
    @slaxblake 5 ปีที่แล้ว

    what if i dont have any XP comment=?? please do magical Image gallery from hacker101 ctfs

  • @LlamaPlaysZ
    @LlamaPlaysZ 5 ปีที่แล้ว +2

    > programer
    > hacker
    > uses linux
    > uses nano instead of vim

    • @_JohnHammond
      @_JohnHammond  5 ปีที่แล้ว

      Hahaha, this is too true. I gotta get into the habit of using vi instead of nano.

  • @karansingh-zi1wx
    @karansingh-zi1wx 5 ปีที่แล้ว +1

    please create a discord community

    • @_JohnHammond
      @_JohnHammond  5 ปีที่แล้ว

      Yeah man! The Discord link is in the description. You can join at discord.gg/VCwJBcn

    • @karansingh-zi1wx
      @karansingh-zi1wx 5 ปีที่แล้ว +1

      thanks bro

  • @macdanielschuks9864
    @macdanielschuks9864 8 หลายเดือนก่อน

    are u really posting this for us to learn or you're just posting a video for likes and comment.
    you're too fast for anyone to follow, if they actually want to learn

  • @msalih
    @msalih ปีที่แล้ว +1

    strings
    exiftool _> look for encoded stuff
    java -jar stegsolve.jar
    zsteg/ zsteg -a
    steghide extract -sf file.jpg // use password you may find somewhere else
    binwalk -dd=".*" file.jpg