Search Across Web Elements (PicoCTF #22 'search-source')

  Рет қаралды 14,211

John Hammond

John Hammond

2 жыл бұрын

Help the channel grow with a Like, Comment, & Subscribe!
❤️ Support ➡ j-h.io/patreon ↔ j-h.io/paypal ↔ j-h.io/buymeacoffee
Check out the affiliates below for more free or discounted learning!
🖥️ Zero-Point Security ➡ Certified Red Team Operator j-h.io/crto
💻Zero-Point Security ➡ C2 Development with C# j-h.io/c2dev
👨🏻‍💻7aSecurity ➡ Hacking Courses & Pentesting j-h.io/7asecurity
📗Humble Bundle ➡ j-h.io/humblebundle
🐶Snyk ➡ j-h.io/snyk
🌎Follow me! ➡ j-h.io/discord ↔ j-h.io/twitter ↔ j-h.io/linkedin ↔ j-h.io/instagram ↔ j-h.io/tiktok
📧Contact me! (I may be very slow to respond or completely unable to)
🤝Sponsorship Inquiries ➡ j-h.io/sponsorship
🚩 CTF Hosting Requests ➡ j-h.io/ctf
🎤 Speaking Requests ➡ j-h.io/speaking
💥 Malware Submission ➡ j-h.io/malware
❓ Everything Else ➡ j-h.io/etc

Пікірлер: 18
@x7331x
@x7331x 5 ай бұрын
Amazing content, congratulations! I thought that this extremely simple challenge had almost nothing to give, but I actually learned how to search all source files in Edge and how to mirror with wget instead of poking my eyes out through files! Thanks!
@laurenlewis4189
@laurenlewis4189 2 жыл бұрын
for anyone interested: you can also use grep's "-h" argument (equivalent to "--no-filename") to suppress the filename in the output
@angryman9333
@angryman9333 Жыл бұрын
nice!
@viv_2489
@viv_2489 2 жыл бұрын
Thanks for sharing additional tips as a part of this challenge ... Really gem 💎
@yoshi5113
@yoshi5113 Жыл бұрын
You always give us cool stuff to complete even the easy ctf challenge. I love you !!
@greyether777
@greyether777 2 жыл бұрын
Nice extra solution methods at the end. Thanks so much man!!
@vanfrancisco4573
@vanfrancisco4573 Жыл бұрын
3:43 I felt that.
@struggle375
@struggle375 Жыл бұрын
Thank you for making these videos
@giuseppe2895
@giuseppe2895 8 ай бұрын
you are the man
@lordspacecake5565
@lordspacecake5565 2 жыл бұрын
Great information!
@app11120
@app11120 2 жыл бұрын
nice one 👍
@marounahel8205
@marounahel8205 Жыл бұрын
thank you bro
@MohiUddin_Shakil
@MohiUddin_Shakil 6 ай бұрын
great
@jasutinn
@jasutinn 2 жыл бұрын
cool
@guruhariroxz
@guruhariroxz 6 ай бұрын
Can anyone tell me what does the Save and finish alias does jh has set up with?
@mjtonyfire
@mjtonyfire 2 жыл бұрын
Your reaction when you saw the flag... price7e55
@micleh
@micleh Жыл бұрын
4:03 Yes, l learned something that many people would have used an extra program for or a crappy website that did the job: mirror a webpage with "wget -m"
@angryman9333
@angryman9333 Жыл бұрын
i think you are attacking HTTrack
Local File Inclusion (PicoCTF 2022 #33 'forbidden-paths')
5:52
John Hammond
Рет қаралды 15 М.
Haha😂 Power💪 #trending #funny #viral #shorts
00:18
Reaction Station TV
Рет қаралды 13 МЛН
Super gymnastics 😍🫣
00:15
Lexa_Merin
Рет қаралды 105 МЛН
Luck Decides My Future Again 🍀🍀🍀 #katebrush #shorts
00:19
Kate Brush
Рет қаралды 6 МЛН
Sprinting with More and More Money
00:29
MrBeast
Рет қаралды 190 МЛН
This Website has No Code, or Does it?
10:08
PwnFunction
Рет қаралды 1,1 МЛН
GHIDRA for Reverse Engineering (PicoCTF 2022 #42 'bbbloat')
17:44
John Hammond
Рет қаралды 197 М.
Java Code & Base64 Encoding (PicoCTF 2022 #21 'safe-opener')
9:44
John Hammond
Рет қаралды 13 М.
Bypassing SQL Filters (picoCTF Web Gauntlet)
14:06
The Cyber Mentor
Рет қаралды 43 М.
Secrets in robots.txt (PicoCTF 2022 #36 'roboto-sans')
9:41
John Hammond
Рет қаралды 22 М.
How Microsoft Accidentally Backdoored 270 MILLION Users
14:45
Daniel Boctor
Рет қаралды 242 М.
Haha😂 Power💪 #trending #funny #viral #shorts
00:18
Reaction Station TV
Рет қаралды 13 МЛН