Steganography (1/2) BsidesCT CTF 2018

If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
E-mail: johnhammond010@gmail.com
PayPal: paypal.me/johnhammond010
GitHub: github.com/JohnHammond
Site: www.johnhammond.org
Twitter: / _johnhammond

Пікірлер: 42

  • @Nikandlv
    @Nikandlv5 жыл бұрын

    Glad to found this channel ! I really enjoy these ctfs. Im a fullstack programmer and love reverse engineering and cracking stuff, security and playing around. Keep up the good work !

  • @CameronKalegi
    @CameronKalegi5 жыл бұрын

    Awesome - tactics and tools alone are helpful, but understanding what you're looking for really makes for valuable content. Keep up the great work!

  • @_JohnHammond

    @_JohnHammond

    5 жыл бұрын

    Thank you so much, will do! :D

  • @rakshitawasthi6647
    @rakshitawasthi66473 жыл бұрын

    This channel made me able to solve various challenges in CTFs. Thank you so much.

  • @mcawalid549
    @mcawalid5495 жыл бұрын

    Awesome I learn many new things , thank you

  • @andrewalonsi
    @andrewalonsi5 жыл бұрын

    I've known about CTF's for a while and it's really cool to see how it's done!

  • @_JohnHammond

    @_JohnHammond

    5 жыл бұрын

    Have you played? Thanks for watching!

  • @andrewalonsi

    @andrewalonsi

    5 жыл бұрын

    @@_JohnHammond I have not...YET I'm still learning independently, barely a script kiddie, but watching hacks and there implications are always fascinating to me :)

  • @_JohnHammond

    @_JohnHammond

    5 жыл бұрын

    @@andrewalonsi You just gotta jump in! I am still a script kiddie too ahaha. Thanks again for watching!

  • @andrewalonsi

    @andrewalonsi

    5 жыл бұрын

    Thank You for the fun and cool content! Looking forward to seeing more of your videos :D

  • @HamadCyber
    @HamadCyber Жыл бұрын

    Always a great fan of your content

  • @solidpain9098
    @solidpain90984 жыл бұрын

    My steg skills just doubled from one vid. Awesome work!!!

  • @_JohnHammond

    @_JohnHammond

    4 жыл бұрын

    Very happy to hear that! Thanks so much for watching!

  • @vibheeshavelayudha1903
    @vibheeshavelayudha19035 жыл бұрын

    Learnt a lot of steg stuff today....

  • @guitaekm
    @guitaekm10 ай бұрын

    Thank you much, exactly what I needed

  • @Jayrprez
    @Jayrprez3 жыл бұрын

    Awesome video where can we find some of these challenges

  • @user-cl8mp2dp2k
    @user-cl8mp2dp2k Жыл бұрын

    What app is this ? The red one at 0:45

  • @i_got_worms7106
    @i_got_worms71065 жыл бұрын

    I would love you to do a tutorial on how to create these puzzles from scratch. The hidden text that's visible using stegsolve, how to put that binary string into a .jpg file and into an image alpha channel etc... Preferably using GIMP and any other Linux derived software...

  • @_JohnHammond

    @_JohnHammond

    5 жыл бұрын

    I can certainly make this happen. I planned to recreate the Account Takeover challenges from the Web category, but I can definitely do these as well. Thanks for the great idea, and thanks for watching! :D

  • @ko-Daegu

    @ko-Daegu

    5 жыл бұрын

    sneaking_ weasel You can someone explain the command he write after he complete a CTF mv {,Complete} What does that mean ???

  • @thirafinajwan
    @thirafinajwan3 жыл бұрын

    Uhm, noob question, soo, after i extracted an image with binwalk, i got file with a description "LRZIP compressed data - version 108.215". However, when i checked the official github page for lrzip, the latest version was 0.631 and last updated in 2016, what did i miss here? Thank you, great video btw.

  • @wime365
    @wime3654 жыл бұрын

    i want to get these pictures,where can i find them?

  • @rubamelhem8617
    @rubamelhem86172 жыл бұрын

    I want the link of these challenges please ! I can't find them

  • @osamaal-sharif7986
    @osamaal-sharif79864 жыл бұрын

    actually iam glad to work on the website that you worked on .... but i found trouble to open it .... can any one tell me why.

  • @ome.mishra
    @ome.mishra5 жыл бұрын

    how to get those things you have downloaded can you give us

  • @ko-Daegu
    @ko-Daegu5 жыл бұрын

    You can someone explain the command he write after he complete a CTF mv {,Complete} What does that mean ???

  • @_JohnHammond

    @_JohnHammond

    5 жыл бұрын

    I am just renaming the folder, and adding on "COMPLETE" at the very end. I use the braces as just quick shorthand so I don't have to repeat the filename. It's just "marking the challenge complete" so I know in the future that I solved that one :D Thank you so much for watching!

  • @ko-Daegu

    @ko-Daegu

    5 жыл бұрын

    John Hammond Thankx for the replay But wanna know how the terminal will know what file you are talking about mv {, complete} Doesn’t exactly tells what file we should use ....

  • @Jayrprez
    @Jayrprez4 жыл бұрын

    This is awesome

  • @_JohnHammond

    @_JohnHammond

    4 жыл бұрын

    Sounds like these are resurfacing at this years BsidesCT! I hope it helps! :D

  • @gajrajsingh51
    @gajrajsingh514 жыл бұрын

    Why did you strip the L in the first challenge ?

  • @_JohnHammond

    @_JohnHammond

    4 жыл бұрын

    L isn't a valid hexadecimal character, hex is only 0-9a-f, so I remove that so the binascii.unhexlify or .decode('hex') -- the latter being the old, now dead and unsupported Python 2 rendition -- will work without an issue. If you don't remove the L, it will error as that is a non-valid hex character. Thanks for watching!

  • @nostalgiccringeallhailchel3881
    @nostalgiccringeallhailchel3881 Жыл бұрын

    3:00 steg solve

  • @Ruhgtfo
    @Ruhgtfo4 жыл бұрын

    sounds like Radbrad

  • @slaxblake
    @slaxblake5 жыл бұрын

    what if i dont have any XP comment=?? please do magical Image gallery from hacker101 ctfs

  • @LlamaPlaysZ
    @LlamaPlaysZ5 жыл бұрын

    > programer > hacker > uses linux > uses nano instead of vim

  • @_JohnHammond

    @_JohnHammond

    5 жыл бұрын

    Hahaha, this is too true. I gotta get into the habit of using vi instead of nano.

  • @karansingh-zi1wx
    @karansingh-zi1wx5 жыл бұрын

    please create a discord community

  • @_JohnHammond

    @_JohnHammond

    5 жыл бұрын

    Yeah man! The Discord link is in the description. You can join at discord.gg/VCwJBcn

  • @karansingh-zi1wx

    @karansingh-zi1wx

    5 жыл бұрын

    thanks bro

  • @macdanielschuks9864
    @macdanielschuks98647 ай бұрын

    are u really posting this for us to learn or you're just posting a video for likes and comment. you're too fast for anyone to follow, if they actually want to learn

  • @msalih
    @msalih Жыл бұрын

    strings exiftool _> look for encoded stuff java -jar stegsolve.jar zsteg/ zsteg -a steghide extract -sf file.jpg // use password you may find somewhere else binwalk -dd=".*" file.jpg