Steganography (1/2) BsidesCT CTF 2018
If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
E-mail: johnhammond010@gmail.com
PayPal: paypal.me/johnhammond010
GitHub: github.com/JohnHammond
Site: www.johnhammond.org
Twitter: / _johnhammond
Пікірлер: 42
Glad to found this channel ! I really enjoy these ctfs. Im a fullstack programmer and love reverse engineering and cracking stuff, security and playing around. Keep up the good work !
Awesome - tactics and tools alone are helpful, but understanding what you're looking for really makes for valuable content. Keep up the great work!
@_JohnHammond
5 жыл бұрын
Thank you so much, will do! :D
This channel made me able to solve various challenges in CTFs. Thank you so much.
Awesome I learn many new things , thank you
I've known about CTF's for a while and it's really cool to see how it's done!
@_JohnHammond
5 жыл бұрын
Have you played? Thanks for watching!
@andrewalonsi
5 жыл бұрын
@@_JohnHammond I have not...YET I'm still learning independently, barely a script kiddie, but watching hacks and there implications are always fascinating to me :)
@_JohnHammond
5 жыл бұрын
@@andrewalonsi You just gotta jump in! I am still a script kiddie too ahaha. Thanks again for watching!
@andrewalonsi
5 жыл бұрын
Thank You for the fun and cool content! Looking forward to seeing more of your videos :D
Always a great fan of your content
My steg skills just doubled from one vid. Awesome work!!!
@_JohnHammond
4 жыл бұрын
Very happy to hear that! Thanks so much for watching!
Learnt a lot of steg stuff today....
Thank you much, exactly what I needed
Awesome video where can we find some of these challenges
What app is this ? The red one at 0:45
I would love you to do a tutorial on how to create these puzzles from scratch. The hidden text that's visible using stegsolve, how to put that binary string into a .jpg file and into an image alpha channel etc... Preferably using GIMP and any other Linux derived software...
@_JohnHammond
5 жыл бұрын
I can certainly make this happen. I planned to recreate the Account Takeover challenges from the Web category, but I can definitely do these as well. Thanks for the great idea, and thanks for watching! :D
@ko-Daegu
5 жыл бұрын
sneaking_ weasel You can someone explain the command he write after he complete a CTF mv {,Complete} What does that mean ???
Uhm, noob question, soo, after i extracted an image with binwalk, i got file with a description "LRZIP compressed data - version 108.215". However, when i checked the official github page for lrzip, the latest version was 0.631 and last updated in 2016, what did i miss here? Thank you, great video btw.
i want to get these pictures,where can i find them?
I want the link of these challenges please ! I can't find them
actually iam glad to work on the website that you worked on .... but i found trouble to open it .... can any one tell me why.
how to get those things you have downloaded can you give us
You can someone explain the command he write after he complete a CTF mv {,Complete} What does that mean ???
@_JohnHammond
5 жыл бұрын
I am just renaming the folder, and adding on "COMPLETE" at the very end. I use the braces as just quick shorthand so I don't have to repeat the filename. It's just "marking the challenge complete" so I know in the future that I solved that one :D Thank you so much for watching!
@ko-Daegu
5 жыл бұрын
John Hammond Thankx for the replay But wanna know how the terminal will know what file you are talking about mv {, complete} Doesn’t exactly tells what file we should use ....
This is awesome
@_JohnHammond
4 жыл бұрын
Sounds like these are resurfacing at this years BsidesCT! I hope it helps! :D
Why did you strip the L in the first challenge ?
@_JohnHammond
4 жыл бұрын
L isn't a valid hexadecimal character, hex is only 0-9a-f, so I remove that so the binascii.unhexlify or .decode('hex') -- the latter being the old, now dead and unsupported Python 2 rendition -- will work without an issue. If you don't remove the L, it will error as that is a non-valid hex character. Thanks for watching!
3:00 steg solve
sounds like Radbrad
what if i dont have any XP comment=?? please do magical Image gallery from hacker101 ctfs
> programer > hacker > uses linux > uses nano instead of vim
@_JohnHammond
5 жыл бұрын
Hahaha, this is too true. I gotta get into the habit of using vi instead of nano.
please create a discord community
@_JohnHammond
5 жыл бұрын
Yeah man! The Discord link is in the description. You can join at discord.gg/VCwJBcn
@karansingh-zi1wx
5 жыл бұрын
thanks bro
are u really posting this for us to learn or you're just posting a video for likes and comment. you're too fast for anyone to follow, if they actually want to learn
strings exiftool _> look for encoded stuff java -jar stegsolve.jar zsteg/ zsteg -a steghide extract -sf file.jpg // use password you may find somewhere else binwalk -dd=".*" file.jpg