Capture The Flag! NahamCon EU CTF "MMORPG"

  Рет қаралды 19,308

John Hammond

John Hammond

Күн бұрын

Learn malware analysis with 0ffset's Zero2Auto training! j-h.io/z2a And pre-register for their updated Beginner course! j-h.io/z2a-beginner
00:00 NahamConCTF MMORPG
03:01 About NahamConCTF 2022
04:51 Challenge Start
06:43 Source code
11:22 input() vs raw_input()
13:03 Executing Commands
16:59 Final Thoughts
Help the channel grow with a Like, Comment, & Subscribe!
❤️ Support ➡ j-h.io/patreon ↔ j-h.io/paypal ↔ j-h.io/buymeacoffee
Check out the affiliates below for more free or discounted learning!
🖥️ Zero-Point Security ➡ Certified Red Team Operator j-h.io/crto
💻Zero-Point Security ➡ C2 Development with C# j-h.io/c2dev
🐜Zero2Automated ➡ Ultimate Malware Reverse Engineering j-h.io/zero2auto
⛳Point3 ESCALATE ➡ Top-Notch Capture the Flag Training j-h.io/escalate
👨🏻‍💻7aSecurity ➡ Hacking Courses & Pentesting j-h.io/7asecurity
📗Humble Bundle ➡ j-h.io/humblebundle
🐶Snyk ➡ j-h.io/snyk
🤹‍♀️SkillShare ➡ j-h.io/skillshare
🌎Follow me! ➡ j-h.io/discord ↔ j-h.io/twitter ↔ j-h.io/linkedin ↔ j-h.io/instagram ↔ j-h.io/tiktok
📧Contact me! (I may be very slow to respond or completely unable to)
🤝Sponsorship Inquiries ➡ j-h.io/sponsorship
🚩 CTF Hosting Requests ➡ j-h.io/ctf
🎤 Speaking Requests ➡ j-h.io/speaking
💥 Malware Submission ➡ j-h.io/malware
❓ Everything Else ➡ j-h.io/etc

Пікірлер: 30
@RealCyberCrime
@RealCyberCrime Жыл бұрын
"to be honest I just completely ripped this off github, hippity hoppity your code is now my property" lolol hey at least you're honest!
@HTWwpzIuqaObMt
@HTWwpzIuqaObMt Жыл бұрын
I mean thats what open source is for (credit shall be given but no one shall feel guilty because he used code that another person wrote).
@ziaratorres6370
@ziaratorres6370 Жыл бұрын
Didn't participate in the CTF but learned a bit from watching this video, thanks John!
@logiciananimal
@logiciananimal Жыл бұрын
It isn't evil, it is eval!
@Torsan1977
@Torsan1977 Жыл бұрын
Thanks for the ctf John! It was so much fun to participate!
@kat90430
@kat90430 Жыл бұрын
Thank you a lot John! Keep posting vids and educate people :)
@notsure1248
@notsure1248 Жыл бұрын
Thank you as always for the information.
@NoportOfbot
@NoportOfbot Жыл бұрын
Thank you John!
@RoyalQueso
@RoyalQueso Жыл бұрын
hippity hoppity, your code is now my property... LMAO
@yurilsaps
@yurilsaps Жыл бұрын
Amazing bro!!!!
@fadlyrambe1739
@fadlyrambe1739 Жыл бұрын
Nice video
@adamn777
@adamn777 Жыл бұрын
Damn you! lol Serenity now!
@MygenteTV
@MygenteTV Жыл бұрын
Hi John would you make making a video on mobile devices security? Like the same stuff you make for windows but for android/apple? No much info on those topics. All we find around is some old msfvenom apk which don't even work no more
@playmusic317
@playmusic317 Жыл бұрын
How do you know that new programs have run ctf have arrived
@ranveersinghrawat7116
@ranveersinghrawat7116 Жыл бұрын
Hey John Sir, how are you! Long time no live stream?
@kingberz
@kingberz 11 ай бұрын
How to start into doing ctf? I know a bit of linux and DevOps but I seem to like reverse engineering more. Any help appreciated but I guess I gotta reverse engineer here as well!!
@l3gendh3ro42
@l3gendh3ro42 Жыл бұрын
How would I go about having a key product on a program i program. I would like a key to activate when the user downloads it on the pc. I don’t want others to access unless purchase was made and not accessible to other computers
@internal_cruelty
@internal_cruelty Жыл бұрын
Hey, it's kinda hard to implement properly,but first idea that comes to my mind, generate a unique GUID on the first launch of your program, then generate a product key based on that, if GUID and key are matching, unlock full functionality
@fatrussianhacker
@fatrussianhacker Жыл бұрын
continue making edits like these 😆
@guilherme5094
@guilherme5094 Жыл бұрын
👍
@hoodietramp
@hoodietramp Жыл бұрын
ayyye John how’s life?
@Angel-Pizzaeater
@Angel-Pizzaeater Жыл бұрын
Good
@somebodystealsmyname
@somebodystealsmyname Жыл бұрын
That was evil John
@donttrusttheape
@donttrusttheape Жыл бұрын
You sneaky You xD
@tlocto
@tlocto Жыл бұрын
unintended blood too xd
@AmarTutorial100
@AmarTutorial100 Жыл бұрын
I want 500k subs celebration video pls....
@torsec6048
@torsec6048 Жыл бұрын
python john ;)
@Ipl_clip_shorts
@Ipl_clip_shorts Жыл бұрын
First comment
@K8LOYT
@K8LOYT Жыл бұрын
this is EVIL CTF tbh hahaha
@Reelix
@Reelix Жыл бұрын
reelix@reelix-oracle:~$ python2 Python 2.7.18 (default, Sep 12 2022, XX:XX:XX) [GCC 12.2.0] on linux2 Type "help", "copyright", "credits" or "license" for more information. >>> input(__import__('os').system('whoami');) File "", line 1 input(__import__('os').system('whoami');) ^ SyntaxError: invalid syntax >>> input(__import__('os').system('whoami')) reelix 0 *cries* I was literally 1 character off :(
Filter Evasion in a REVERSE SHELL (no spaces!!)
29:11
John Hammond
Рет қаралды 39 М.
The King Of Malware is Back
19:27
John Hammond
Рет қаралды 190 М.
ELE QUEBROU A TAÇA DE FUTEBOL
00:45
Matheus Kriwat
Рет қаралды 11 МЛН
Когда на улице Маябрь 😈 #марьяна #шортс
00:17
BEGINNER Capture The Flag - PicoCTF 2021 001 "Obedient Cat"
22:16
John Hammond
Рет қаралды 400 М.
Finding WEIRD Devices on the Public Internet
27:48
John Hammond
Рет қаралды 213 М.
How Hackers Hide
20:55
John Hammond
Рет қаралды 235 М.
Going to Chinese Hacking Competition - Real World CTF Finals
12:47
LiveOverflow
Рет қаралды 1,5 МЛН
Become a Certified Penetration Tester with HackTheBox CPTS!
16:25
John Hammond
Рет қаралды 99 М.
How to Proxy Command Execution: "Living Off The Land" Hacks
19:10
John Hammond
Рет қаралды 50 М.
NahamCon CTF 2023: Web Challenge Walkthroughs
26:09
CryptoCat
Рет қаралды 11 М.
How Hackers Write Malware & Evade Antivirus (Nim)
24:04
John Hammond
Рет қаралды 381 М.
Why it Was Almost Impossible to Put a Computer in Space
17:20
Linus Tech Tips
Рет қаралды 548 М.
you should be using PODMAN
10:39
John Hammond
Рет қаралды 83 М.