Steganography (1/2) BsidesCT CTF 2018
ฝัง
- เผยแพร่เมื่อ 4 พ.ย. 2018
- If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
E-mail: johnhammond010@gmail.com
PayPal: paypal.me/johnhammond010
GitHub: github.com/JohnHammond
Site: www.johnhammond.org
Twitter: / _johnhammond
Glad to found this channel ! I really enjoy these ctfs.
Im a fullstack programmer and love reverse engineering and cracking stuff, security and playing around.
Keep up the good work !
This channel made me able to solve various challenges in CTFs. Thank you so much.
Awesome - tactics and tools alone are helpful, but understanding what you're looking for really makes for valuable content. Keep up the great work!
Thank you so much, will do! :D
Awesome
I learn many new things , thank you
Always a great fan of your content
My steg skills just doubled from one vid. Awesome work!!!
Very happy to hear that! Thanks so much for watching!
Thank you much, exactly what I needed
I've known about CTF's for a while and it's really cool to see how it's done!
Have you played? Thanks for watching!
@@_JohnHammond I have not...YET I'm still learning independently, barely a script kiddie, but watching hacks and there implications are always fascinating to me :)
@@andrewalonsi You just gotta jump in! I am still a script kiddie too ahaha. Thanks again for watching!
Thank You for the fun and cool content! Looking forward to seeing more of your videos :D
Learnt a lot of steg stuff today....
Awesome video where can we find some of these challenges
Uhm, noob question, soo, after i extracted an image with binwalk, i got file with a description "LRZIP compressed data - version 108.215".
However, when i checked the official github page for lrzip, the latest version was 0.631 and last updated in 2016, what did i miss here? Thank you, great video btw.
I want the link of these challenges please !
I can't find them
What app is this ? The red one at 0:45
actually iam glad to work on the website that you worked on .... but i found trouble to open it .... can any one tell me why.
how to get those things you have downloaded can you give us
I would love you to do a tutorial on how to create these puzzles from scratch. The hidden text that's visible using stegsolve, how to put that binary string into a .jpg file and into an image alpha channel etc... Preferably using GIMP and any other Linux derived software...
I can certainly make this happen. I planned to recreate the Account Takeover challenges from the Web category, but I can definitely do these as well. Thanks for the great idea, and thanks for watching! :D
sneaking_ weasel
You can someone explain the command he write after he complete a CTF
mv {,Complete}
What does that mean ???
i want to get these pictures,where can i find them?
You can someone explain the command he write after he complete a CTF
mv {,Complete}
What does that mean ???
I am just renaming the folder, and adding on "COMPLETE" at the very end. I use the braces as just quick shorthand so I don't have to repeat the filename. It's just "marking the challenge complete" so I know in the future that I solved that one :D Thank you so much for watching!
John Hammond
Thankx for the replay
But wanna know how the terminal will know what file you are talking about
mv {, complete}
Doesn’t exactly tells what file we should use ....
This is awesome
Sounds like these are resurfacing at this years BsidesCT! I hope it helps! :D
Awesome I have no clue what your doing lol
3:00 steg solve
Why did you strip the L in the first challenge ?
L isn't a valid hexadecimal character, hex is only 0-9a-f, so I remove that so the binascii.unhexlify or .decode('hex') -- the latter being the old, now dead and unsupported Python 2 rendition -- will work without an issue. If you don't remove the L, it will error as that is a non-valid hex character. Thanks for watching!
sounds like Radbrad
what if i dont have any XP comment=?? please do magical Image gallery from hacker101 ctfs
> programer
> hacker
> uses linux
> uses nano instead of vim
Hahaha, this is too true. I gotta get into the habit of using vi instead of nano.
please create a discord community
Yeah man! The Discord link is in the description. You can join at discord.gg/VCwJBcn
thanks bro
are u really posting this for us to learn or you're just posting a video for likes and comment.
you're too fast for anyone to follow, if they actually want to learn
strings
exiftool _> look for encoded stuff
java -jar stegsolve.jar
zsteg/ zsteg -a
steghide extract -sf file.jpg // use password you may find somewhere else
binwalk -dd=".*" file.jpg