No video

Linear independence and GF(2) - 34C3 CTF software_update (crypto) part 2/2

  Рет қаралды 40,617

LiveOverflow

LiveOverflow

Күн бұрын

In this video we only focus on the mathematical solution for software_update from the 34c3 CTF.
sage script:
gist.github.co...
=[ 🔴 Stuff I use ]=
→ Microphone:* geni.us/ntg3b
→ Graphics tablet:* geni.us/wacom-...
→ Camera#1 for streaming:* geni.us/sony-c...
→ Lens for streaming:* geni.us/sony-l...
→ Connect Camera#1 to PC:* geni.us/cam-link
→ Keyboard:* geni.us/mech-k...
→ Old Microphone:* geni.us/mic-at...
US Store Front:* www.amazon.com...
=[ ❤️ Support ]=
→ per Video: / liveoverflow
→ per Month: / @liveoverflow
=[ 🐕 Social ]=
→ Twitter: / liveoverflow
→ Website: liveoverflow.com/
→ Subreddit: / liveoverflow
→ Facebook: / liveoverflow
=[ 📄 P.S. ]=
All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
#CTF #Cryptography

Пікірлер: 131
@__mk_km__
@__mk_km__ 6 жыл бұрын
1 AM _Perfect time for crypto math_
@theLuigiFan0007Productions
@theLuigiFan0007Productions 6 жыл бұрын
1:05AM here and I can fully agree with and approve of that statement.
@SIFFTYDESIGNER
@SIFFTYDESIGNER 6 жыл бұрын
3:21 AM, best time for that tbh.
@gaydolfhitler6310
@gaydolfhitler6310 6 жыл бұрын
05:03AM I think I won
@tschichpich
@tschichpich 5 жыл бұрын
@@gaydolfhitler6310 depending on if it's pre- or post-sleep
@chrissxMedia
@chrissxMedia 5 жыл бұрын
2:17 am
@abuhamza2771
@abuhamza2771 6 жыл бұрын
7:26 i'm going to use your *dingdingding* as a ringtone for my phone
@LiamDennehy
@LiamDennehy 6 жыл бұрын
Finally, closure from part 1. Need to clean the walls now, my mind just got blown and there are bits everywhere. Great visualisation of vector algebra BTW. Either you've seen +3Blue1Brown's videos, or he needs to see this before you collaborate (you really should). I had no idea these two topics could overlap, seriously well done.
@LiveOverflow
@LiveOverflow 6 жыл бұрын
Of course I know 3Blue1Brown's videos. They are blowing my mind every time. I wish I could have explained this topic as well as 3Blue1Brown would have done it. But I'm happy it was good enough for you to understand it :)
@bhnjhbjhbkgkkvhnhmbm
@bhnjhbjhbkgkkvhnhmbm 6 жыл бұрын
Ok, but somewhere is a dude sitting who came up with this challenge. What. The. And I am happy I understood it for second watch. I am inspired!
@carbon13
@carbon13 4 жыл бұрын
This is the first ctf write-up video where I didn't have to watch the entire thing to understand the solution. I feel accomplished.
@connorhorman
@connorhorman 6 жыл бұрын
Awesome. Combining Comp Sci and Advanced Math, my 2 favorite subjects.
@112BALAGE112
@112BALAGE112 6 жыл бұрын
What is your GF like? Crypto nerd: She is ideal.
@TheGrimravager
@TheGrimravager 6 жыл бұрын
clever
@renakunisaki
@renakunisaki 5 жыл бұрын
Unfortunately she exists in a GF(2) vector space.
@Silent.
@Silent. 3 жыл бұрын
She is independent
@catgirlinspace
@catgirlinspace 6 жыл бұрын
Today in school while making a cross word puzzle for a project, I injected some HTML into the hints for the cross word words. Now I’m the only student in our grade with a cross word puzzle with images for the hints.
@tiberiud
@tiberiud 6 жыл бұрын
Somewhat unrelated to the actual CTF challenge, but boy have you made me understand matrices a whole lot better!
@LiveOverflow
@LiveOverflow 6 жыл бұрын
that's awesome!
@ifconfigurator
@ifconfigurator 6 жыл бұрын
_"Isn't that amazing?"_ Yes, that is mind blowing.
@0dWHOHWb0
@0dWHOHWb0 6 жыл бұрын
Oh wow... That was a lot more involved than I was anticipating... Despite learning all this in university, this would never have occurred to me. In retrospect, of course, it does make perfect sense.
@roguesecurity
@roguesecurity 6 жыл бұрын
Mind blowing. I loved the part of Christof Paar's lecture. It reminded me of my cryptography classes and his videos helped me to learn theories of cryptography
@upliftingspirit6873
@upliftingspirit6873 3 жыл бұрын
That was just incredible. Perfect explanation on vectors and linear independence and boy ... what a clever challenge. Thanks for that!
@rawbytes7356
@rawbytes7356 4 жыл бұрын
This is mind blowing,most of it overflowed above my head but this is really amazing. Thank you very much
@techtech7803
@techtech7803 6 жыл бұрын
You seriously make some of the best stuff on KZfaq.
@blazingkin
@blazingkin 6 жыл бұрын
Neat! I knew the math, but didn't know you could apply it to xor like that!
@LiveOverflow
@LiveOverflow 6 жыл бұрын
me neither!
@Kabbone
@Kabbone 6 жыл бұрын
That one was really mind blowing. Probably have to watch it again to get all things sorted out in my brain :D
@AtraLP
@AtraLP 6 жыл бұрын
This was amazing! Your explaination and visualization were perfect!
@valerianmp
@valerianmp 5 жыл бұрын
The finite field GF(2^p) is everywhere in crypto
@fabianheine777
@fabianheine777 6 жыл бұрын
Thank you. I've always been interesting in "hacking" but never had the motivation to do something with it. Mostly because I just did not know where to start. But since I found out about your channel, the motivation came out of nowhere. Your video's are really helping me understanding how "hacking" works. You also heped me discover CTF challenges, wth I didn't even know these existed. One week later I finished about 20 easy challenges without cheating/hints. You are amazing, and you make amazing video's. Please keep up the good work!!!
@z4rathustr4
@z4rathustr4 4 жыл бұрын
Amazing, your teammate is so good at linear algebra, wish I have that math skills! Congratz!! (so late lmao)
@Fachher
@Fachher 6 жыл бұрын
I wished I had a professor like you at our university. Instead, we had a lady who corrects herself 3 times in a row. Please don't stop.
@RaduPopescu000
@RaduPopescu000 6 жыл бұрын
Splendidly done! And an a great write-up!
@TecrasTrash
@TecrasTrash 6 жыл бұрын
Da ich ab August in den Mathekurs für die Fachhochschulreife (neben der FISI-Ausbildung) einsteige, danke für die Einführung in Vektoren. Aber das auf SHA-256 und XOR in Verbindung mit französisch anmutenden Feldern anzuwenden, ist pure Magie.
@TheKaruso33
@TheKaruso33 6 жыл бұрын
"Field" ist im deutschen ein Körper. Vermutlich solltest du hier aufhören zu lesen, mir war langweilig. Eine sog. algebraische Struktur, d.h. grob gesagt eine Menge, "mit der man Rechnen kann". (es gibt eine Addition, Multiplikation und die üblichen Rechenregeln: Assoziativität, Kommutativität, Distributivität. Außerdem gibt es jeweils ein "neutrales Element" [für "+" ist das 0, für "*" ist das 1] und inverse Elemente [also zu 3 zb. -3 bzw 1/3]). Im Endeffekt kann man also mit einem Körper rechnen "wie mit den reellen oder den rationalen Zahlen". Das ist auch nicht wirklich "magisch". Beim Lösen von Gleichungen braucht man eigentlich nur diese Eigenschaften, welche Zahlen man dann zur Verfügung hat, ist prinzipiell egal: Beispiel: x^2 - 1 = 0 (x + 1)(x-1) = 0 x = 1 oder x = -1 Damit hat diese Gleichung über den rationalen Zahlen zwei Lösungen, nämlich 1 und -1. Nun ist aber "-1" das additive Inverse zu 1, d.h. die Zahl aus dem Körper, die man zu 1 addieren muss, damit 0 heraus kommt. Über GF(2) ist 1 + 1 = 0. 1 ist also selbstinvers, d.h. -1 = 1. Über GF(2) hat diese Gleichung also nur eine Lösung, nämlich 1 (man könnte auch -1 schreiben, so ähnlich wie man statt 1/2 ja auch 2/4 schreiben könnte über den rationalen Zahlen) Man beachte, dass etwas die dritte binomische Formel, die hier verwendet wurde, über jedem Körper funktioniert, denn: Sind a, b Elemente aus einem beliebigen Körper, so ist (a-b)(a+b) = (Distributivität) a(a+b) - b(a+b) = (Distributivität) a*a + a*b - b*a - b*b = (Kommutativität) a^2 + a*b - a*b - b^2 = (-a*b ist das additive Inverse zu a*b) a^2 + 0 - b^2 = a^2 - b^2
@theohallenius8882
@theohallenius8882 6 жыл бұрын
Very interesting, have to try these crypto challenges myself but I'm pretty sure I wouldn't figure this one out and just waste time. At least my goal is to learn what not to do in cryptography, and your videos sure help a lot. In this case it's how not to make an update system.
@DacoTaco
@DacoTaco 6 жыл бұрын
omfg around 7:33 when he started talking about XOR-ing bytes thats when i got the picture and understood what was wrong. i remembered the code from part 1. HOLY SHIT, just...holy shit! o.O
@renakunisaki
@renakunisaki 5 жыл бұрын
I thought this would be a lot simpler. Include the original pre_copy.sh and two copies of your modified version. Hack the zip file so they all have the same name. The hashes of the two copies of your version cancel out, making it as if they didn't exist, but they overwrite the original when extracted. Also, could you defend against this by also including the number of files in the zip in the hash input?
@mischa7823
@mischa7823 5 жыл бұрын
I am thinking about a reason why this sould not work... And I can't find any... can someone pls confirm (or deny) that this is working?
@terinjokes
@terinjokes 3 жыл бұрын
If I recall the updater code correctly, the hash was checked after the zip was extracted to a temporary directory, but before the pre-copy was executed. Including the original pre-copy and two copies of a modified version wouldn't have worked: either the final pre-copy on the filesystem is your modified version (in which case the hash would fail) or it's the original (in which case you haven't hacked the router).
@respiii
@respiii 6 жыл бұрын
5:40 pass auf was du sagst sonst erkennt dir die TU Lina ab ^^ Danke für das Video jetzt hab ich ne idee für was ich in den Mathe modulen eigentlich lerne!
@varkokonyi
@varkokonyi 6 жыл бұрын
Pretty good video, I wanted to understand most of it but had a good sleep instead. I understand most of your videos, but sleep is good as well
@hdwe1756
@hdwe1756 6 жыл бұрын
I get it! Awesome. BTW any suggestions on how to form/find/join a CTF team?
@themadichib0d
@themadichib0d 5 жыл бұрын
I know this is an old video but is this essentially just describing how a hash collision work? If so this is the best description of the actual mathematical reasoning behind it I've seen. That or I totally missed something and this is different, but still cool none the less.
@renakunisaki
@renakunisaki 5 жыл бұрын
This is a novel way to force a hash collision in this computation. In general, a hash collision is when two different inputs have the same hash. SHA256 is specifically designed to make this extremely unlikely. But in this case, the final hash isn't a SHA256 hash, it's a lot of SHA256 hashes XORed together. So, XOR is being used as a secondary hash function, and it's much easier to cause collisions with that. The clever part is how they were able to control the SHA256 hashes to create a desired input to the XOR function, without having to brute force arbitrary SHA256 hashes (which is practically impossible).
@DarkDog09
@DarkDog09 5 жыл бұрын
Scary stuff! The xoring looked so sane to me...
@casperes0912
@casperes0912 6 жыл бұрын
This was brilliant. Thanks.
@FC-rq1np
@FC-rq1np 6 жыл бұрын
Brilliant. If only it was solved for ADD instead of XOR we may have been millionaires...
@lexer_
@lexer_ 5 жыл бұрын
This is interesting and I think I kind of get it. Is there a way of intuitively or even mathematically check quickly if the runtime of such an attack is feasible? Obviously, it is but how could you guess beforehand?
@mapleint997
@mapleint997 3 жыл бұрын
interestingly, there is also a way to make this challenge impossible because if it isn't full rank (not all vectors are linearly independent) you are going to be in trouble, as when that happens you many times won't be able to reach that point in space with the vectors you have.
@arisweedler4703
@arisweedler4703 3 жыл бұрын
oh SNAP they only got 0s and 1s as the solution to the system of equations because that's the field they're in. My intuition was expecting to have to take fractions as the scalars attached to the 256 vectors (the "basis vectors", if I remember anything from my linear algebra class). But that's just wrong - because it's GF2 you won't ever need anything other than 1 and 0
@Mat2095
@Mat2095 6 жыл бұрын
So, I wondered what was the probability of those 256 random 256-dimensional-vectors in GF(2) being linear independent? I got 28.8788...%, can somebody confirm or deny this?
@MKkniGEAR
@MKkniGEAR 6 жыл бұрын
Great question, if you suppose that each vector has the same chance of appearing I got 28,8788...% aswell. I wonder if picking the n first integers as in the video produces some uniform distribution on the SHA-256 hash though, I have absolutely no idea. If someone good in crypto knows, I'd like to know more :)
@lucasmarin4040
@lucasmarin4040 5 жыл бұрын
how did yo get that result?
@spreen_co
@spreen_co 6 жыл бұрын
Finally! The solution!
@spreen_co
@spreen_co 6 жыл бұрын
Ohh.. I thought in the wrong direction. With linear independence I thought it was about orthogonality and multiplication to zero. Not linear combination. That makes more sense!
@peterforthewin
@peterforthewin 6 жыл бұрын
Like, as always
@maxmusterspace6037
@maxmusterspace6037 6 жыл бұрын
*puffff* MINDBLOWN!!
@spreen_co
@spreen_co 6 жыл бұрын
Two questions. a) You find a method to forge the hash, but it does not include your actual python payload? Its not part of the 'added vectors', is it? And b), how do you solve a series of mathematical equations that have xor instead of plus as the operator?
@LiveOverflow
@LiveOverflow 6 жыл бұрын
a) the python code is complete. What do you mean with "forge the hash"? b) XOR is equivalent to plus in GF(2). So you just have to do your calculations in that finite-field (I know it's untypical for your everyday calculator, but in sage you can see that we set the matrix to `Zmod(2)`
@_nlowe
@_nlowe 6 жыл бұрын
A) If I remember my crypto class correctly, We have two hashes, the valid hash of the payload and our invalid hash after our modifications. We are looking to add some content in addition to our modifications (the backdoored pre_copy script) that when xor'd with the new invalid hash outputs the previously valid hash. B) Under GF(2) addition = subtraction = xor. The way I was taught was to take the vector as a polynomial. Every place where you have a set bit, you have a variable of a chosen power. For example, 1011 = x^3 + x + 1 and 0101 = x^2 + 1. If I "add" these two polynomials together under GF(2) (or "xor" the bit values) I get 1110 = x^3 + x^2 + x^1! Because coefficients of a series of polynomials can be represented as entries in a matrix, we can use something like sage to transform the matrix into reduced row-echelon form, solving the series of equations and showing us which of the linearly independent "vectors" / polynomials need to be "added" to our changes to produce the valid hash.
@LiveOverflow
@LiveOverflow 6 жыл бұрын
a) oh yeah ok. as you can see in the video, I just modified the original software_updater code to spit out that hash.
@TheKaruso33
@TheKaruso33 6 жыл бұрын
Solving a system of equations basically only relies upon having certain operations available to you (besides the usual rules that Associativity and Commutativity), namely elements have inverse elements. If you have that, you can basically just solve equations like you always would. Example: Consider the equation x^2 - 1 = 0 (x - 1)(x+1) = 0 If this equation was to be solved over the rational numbers, its solutions would be 1 and -1. Over GF(2) however, "-1", i.e. "the additive inverse to 1" or the number that when added to 1 results in 0, is 1, because 1 + 1 = 0 ==> 1 = -1 That means over GF(2) this equation has only one solution: 1 (or -1, it doesnt really matter which one you state as the solution, since they are the same. Much like 1/2 = 2/4 over the rationals).
@TheKaruso33
@TheKaruso33 6 жыл бұрын
You should have probably at least mentioned what a field is, and why its useful in this case, that ({0, 1}, XOR, *) is in fact a field. Then again, I also understand why you chose not to...
@andreymx
@andreymx 5 жыл бұрын
Solving a linear equation in 256x256 matrix sounds pretty impossible to me and yet the program seems to do it so quickly...
@Scratchmex
@Scratchmex 4 жыл бұрын
It isn't with Cramer rule and a finite field of dim 2
@Geisterhebel
@Geisterhebel 6 жыл бұрын
Nicely explained
@jojo123150
@jojo123150 6 жыл бұрын
Re Linear dependence: Aren't all non-equal, non-zero vectors in GF(2) independent? My thinking is that if you have two vectors P and Q that are dependent, there must be a scalar S such that S*P=Q. But since we're in GF(2), the possible values for S are just 0 and 1. That's not to say anything you did is incorrect, but it does mean that the dependence check using sage is unnecessary if you ensure all file names are unique (and that hash collisions are improbable).
@noqnoqi8552
@noqnoqi8552 6 жыл бұрын
Any *two* non-equal vectors are LI in GF(2)^n but you could have three non-equal vectors that are not. e.g. (0,1), (1,1) and (1,0) in GF(2)^2. The problem here is to get 256 LI vectors in GF(2)^256.
@levicailleret
@levicailleret 3 жыл бұрын
I think it's totally normal that you got 256 linear independent hashes on your first try. They'd only be dependent, if they were exaclty the same (bc there are no multiples in GF2, 2*0 = 0 and 2*1 = 2 which does not exist). And creating the same hash would be a sha256 hash collision. ^^
@akuviljanen4695
@akuviljanen4695 3 жыл бұрын
You can have linearly dependent vectors without a collision. For example: (1 0 0 0 0 ...) (0 1 0 0 0 ...) (1 1 0 0 0 ...) The third vector can be reached by adding the first two, hence they are linearly dependent. That said, "randomly" chosen vectors are likely to be independent in general (unless you choose more vectors than the dimension, then they are guaranteed to be dependent).
@GreatLich
@GreatLich 4 жыл бұрын
if the filename/ data(path,date,etc...) is used to generate the hash. Then is the filename/data not the key to decrypting the hash?
@joepelletier6694
@joepelletier6694 5 жыл бұрын
My mind is so blown
@liverecon
@liverecon 6 жыл бұрын
Ok bat I dont understen how read creating or reding vurnability in any programs? Is important programme lengu?*
@joepelletier6694
@joepelletier6694 5 жыл бұрын
In gf 2 two vectors need to be identical to be linearly dependant. Just saying.
@ruroruro
@ruroruro 4 жыл бұрын
Necroing a comment from 1 year ago, lol. Yes, but 3 (or more) vectors in gf 2 can be linearly dependant and all unique at the same time. For example, (0001), (0010) and (0011) are all different and linearly dependant. : )
@dufflepod
@dufflepod 6 жыл бұрын
Fantastic vid
@maltepoll
@maltepoll 6 жыл бұрын
Finally :D
@GreenyDe
@GreenyDe 6 жыл бұрын
Haha, my former professor at your video! Did you studie at Ruhr Universität Bochum? ;-) I got my master degree in IT-Security at RUB.
@Anonymouspock
@Anonymouspock 6 жыл бұрын
Flo S He might talk about it on his site but he's definitely talked about it in the hardware video where he borrowed a chip whisperer.
@hoxorious
@hoxorious 6 жыл бұрын
Amazing!!
@tiberiui4027
@tiberiui4027 6 жыл бұрын
11:17 Defined over the Galo-is field
@idkfkingknowlmao
@idkfkingknowlmao 6 жыл бұрын
I'm probably dumb, but, If I remember my ALGA classes right, you need to compare 2 vectors to say if they are independent or dependent. At 11:50 when you run the SAGE script what are you comparing against to know if they are or not.
@ELYESSS
@ELYESSS 6 жыл бұрын
He is comparing all the vectors in the matrix against each others
@idkfkingknowlmao
@idkfkingknowlmao 6 жыл бұрын
Yup, I'm dumb! XD Didn't see he created a matrix with old vectors! Thanks!
@kcnl2522
@kcnl2522 Жыл бұрын
I understand the math part but i have a difficulty connecting it with the code...
@justknot4481
@justknot4481 4 жыл бұрын
Can you reduce the 256 with rainbowtables ?
@rlynotabot
@rlynotabot 4 жыл бұрын
did you really draw this 256bit matrix ? x)
@HritikV
@HritikV 6 жыл бұрын
Can you provide us with the router python scripts so that we don't have to retype them in order to practice this thing ?
@LiveOverflow
@LiveOverflow 6 жыл бұрын
it's on the 34c3ctf site: archive.aachen.ccc.de/34c3ctf.ccc.ac/challenges/
@siteking4289
@siteking4289 5 жыл бұрын
6:05 probably no one ever told his girlfriend :(
@Silent.
@Silent. 3 жыл бұрын
Wait linear Algebra is useful, I’m gonna revise some stuff
@0xEmmy
@0xEmmy 6 жыл бұрын
I need to learn linear algebra. I've had enough calc anyways.
@joirnpettersen
@joirnpettersen 5 жыл бұрын
Watch out 3blue1brown! LiveOverflow's stealing the market!
@stormxploit3675
@stormxploit3675 6 жыл бұрын
Hello have you a server discord ,
@ctrl-alt-tutor5587
@ctrl-alt-tutor5587 6 жыл бұрын
First
@almightyhydra
@almightyhydra 6 жыл бұрын
How to defend against something like this?
@ilyail3
@ilyail3 6 жыл бұрын
almightyhydra don't use something easily modeled like a single xor, if for example the operation to concat hashes was another sha256 instead of xor, this wouldn't have worked
@liamosuilleabhain9965
@liamosuilleabhain9965 6 жыл бұрын
Don't XOR for crypto.
@LiveOverflow
@LiveOverflow 6 жыл бұрын
Have you looked at any crypto algorithm? I think all of them use XOR at some point ;)
@liamosuilleabhain9965
@liamosuilleabhain9965 6 жыл бұрын
Exactly, the safest crypto would use only MOV and maybe a JMP at the end. :D
@ltstaffel5323
@ltstaffel5323 6 жыл бұрын
movinator proves that mov is no more safe than anything else because everything could potentially be reduced to a series of movs
@dotty.
@dotty. 6 жыл бұрын
Wait so in gf(2) 0+0=1+1?? What is this?
@LiveOverflow
@LiveOverflow 6 жыл бұрын
It’s GF(2) ;) it’s a very different world
@dotty.
@dotty. 6 жыл бұрын
LiveOverflow tbh I expected 1+1=10 >.
@LiveOverflow
@LiveOverflow 6 жыл бұрын
But you have only one bit. 10 would require two bits. But do you see how this results ends in a 0? Basically you can imagine that only this 0 stays, because you don’t have space for the 1
@dotty.
@dotty. 6 жыл бұрын
LiveOverflow yea think you explained that really well in the video and it does make sense I just didn't expect that ^^
@RagaarAshnod
@RagaarAshnod 5 жыл бұрын
Any chance you could talk about eigen values? :3
@valerianmp
@valerianmp 5 жыл бұрын
Isn‘t what you‘re talking about linear independence js actually just span of the vectors? Linear independce is when all of your vector collection can‘t be built by another vector in that collection
@oldbootz
@oldbootz 5 жыл бұрын
sploosh
@X3eRo0
@X3eRo0 6 жыл бұрын
Why are you using redstar os Are you in korea
@HritikV
@HritikV 6 жыл бұрын
[Ignore this comment] To get 256 linearly independent vectors, you could have used unit vector in each direction. Something like [1,0,0......0] and [0,1,0,0....,0] and ... Same as standard unit vectors i, j and k.
@ifconfigurator
@ifconfigurator 6 жыл бұрын
Hritik Vijay and how would you get sha256 to return the unit vectors?
@tiberiui4027
@tiberiui4027 6 жыл бұрын
He would have to create files that have their hashes [1,0,0...0], [0,1,0...] which is not possible. He had to work with the hashes of the files he just created. Because he can't just send hashes, he has to send files whose hashes xored get the desired result.
@HritikV
@HritikV 6 жыл бұрын
Oops! My bad.
@AshtonSnapp
@AshtonSnapp 6 жыл бұрын
wow
@flTobi
@flTobi 6 жыл бұрын
Wieso sind in dieser Kommentar Section so viele Deutsche? xD
@flTobi
@flTobi 6 жыл бұрын
Axel Latvala ?
@HritikV
@HritikV 6 жыл бұрын
Everyone! Head over to crypto-textbook.com . Cool videos spotted!
@liverecon
@liverecon 6 жыл бұрын
Hello. Pls I Don't understen
Magic? 😨
00:14
Andrey Grechka
Рет қаралды 14 МЛН
Magic trick 🪄😁
00:13
Andrey Grechka
Рет қаралды 47 МЛН
Gli occhiali da sole non mi hanno coperto! 😎
00:13
Senza Limiti
Рет қаралды 17 МЛН
Parenting hacks and gadgets against mosquitoes 🦟👶
00:21
Let's GLOW!
Рет қаралды 13 МЛН
Is the Future of Linear Algebra.. Random?
35:11
Mutual Information
Рет қаралды 269 М.
Attacking LLM - Prompt Injection
13:23
LiveOverflow
Рет қаралды 370 М.
The moment we stopped understanding AI [AlexNet]
17:38
Welch Labs
Рет қаралды 943 М.
XS-Search abusing the Chrome XSS Auditor - filemanager 35c3ctf
13:16
I forced EVERYONE to use Linux
22:59
NetworkChuck
Рет қаралды 425 М.
Ethereum Smart Contract Hacking - Real World CTF 2018
19:34
LiveOverflow
Рет қаралды 89 М.
The Circle of Unfixable Security Issues
22:13
LiveOverflow
Рет қаралды 113 М.
Hacker Tweets Explained
13:47
LiveOverflow
Рет қаралды 159 М.
Magic? 😨
00:14
Andrey Grechka
Рет қаралды 14 МЛН