filmov
tv
Improve Cybersecurity Skills with CTFs - PicoCTF Walkthrough (2018)

Показать описание
Want to improve your cybersecurity / ethical hacking skills but don't know where to start? Cyber security Capture The Flag (CTF) games are the perfect place to practice and learn.
picoCTF is a beginner's level computer security game that consists of a series of challenges where participants must reverse engineer, break, hack, decrypt, or do whatever it takes to solve the challenge. The challenges are all set up with the intent of being hacked, making it an excellent, legal way to get hands-on experience.
This video is a walkthrough on how to solve the challenges from the picoCTF 2018 game. Consider trying to solve the challenges on your own first, then watch how to solve them.
⭐️Contents ⭐️
⌨️ (0:00:16) [01] General & Forensics Warmups
⌨️ (0:11:54) [02] Resources & Reversing Warmups
⌨️ (0:21:41) [03] Cryptography Warmups, grep & netcat
⌨️ (0:34:38) [04] Here's Johnny
⌨️ (0:45:29) [05] strings, pipe & Inspect Me
⌨️ (0:50:48) [06] grep2, Aca-Shell-A, Client Side is Still Bad
⌨️ (1:01:53) [07] Logon & Reading Between The Eyes
⌨️ (1:08:54) [08] [08] Recovering From the Snap & Admin Panel
⌨️ (1:14:12) [09] Assembly 0 & Buffer Overflow 0
⌨️ (1:26:07) [10] Caesar Cipher 1, ENV, & Hertz
⌨️ (1:32:26) [11] [11] Hex Editor, SSH, Irish Name Repo
⌨️ (1:38:57) [12] Mr. Robots, Login, & Secret Agent
⌨️ (1:46:54) [13] Truly an Artist & Assembly 1
⌨️ (1:53:04) [14] be-quick-or-be-dead 1 & blaise's cipher
⌨️ (2:00:47) [15] Buffer Overflow 1 & Hertz 2
⌨️ (2:09:16) [16} leak me & Now You See Me
⌨️ (2:15:40) [17] quackme
⌨️ (2:26:01) [18] Shellcode
⌨️ (2:30:28) [19] What Base Is This?
⌨️ (2:39:10) [20] You Cant See Me & Buttons
⌨️ (2:43:09) [21] Super Ext Magic
⌨️ (2:51:09) [22] The Vault & What's My Name
⌨️ (2:56:45) [23] Absolutely Relative
⌨️ (3:00:33) [24] Assembly 2
⌨️ (3:08:32) [25] Buffer Overflow 2
⌨️ (3:17:07) [26] Caesar Cipher 2
⌨️ (3:22:44) [27] ret2libc Exploits (got 2 learn libc)
⌨️ (3:38:50) [28] RSA Madlibs
⌨️ (3:55:54) [29] BE QUICK OR BE DEAD 2
⌨️ (4:07:37) [30] in out error
⌨️ (4:11:57) [31] Artisinal Handcrafted HTTP 3
⌨️ (4:19:55) [32] echooo
⌨️ (4:31:47) [33] learn gdb
⌨️ (4:36:34) [34] Flaskcards
--
picoCTF is a beginner's level computer security game that consists of a series of challenges where participants must reverse engineer, break, hack, decrypt, or do whatever it takes to solve the challenge. The challenges are all set up with the intent of being hacked, making it an excellent, legal way to get hands-on experience.
This video is a walkthrough on how to solve the challenges from the picoCTF 2018 game. Consider trying to solve the challenges on your own first, then watch how to solve them.
⭐️Contents ⭐️
⌨️ (0:00:16) [01] General & Forensics Warmups
⌨️ (0:11:54) [02] Resources & Reversing Warmups
⌨️ (0:21:41) [03] Cryptography Warmups, grep & netcat
⌨️ (0:34:38) [04] Here's Johnny
⌨️ (0:45:29) [05] strings, pipe & Inspect Me
⌨️ (0:50:48) [06] grep2, Aca-Shell-A, Client Side is Still Bad
⌨️ (1:01:53) [07] Logon & Reading Between The Eyes
⌨️ (1:08:54) [08] [08] Recovering From the Snap & Admin Panel
⌨️ (1:14:12) [09] Assembly 0 & Buffer Overflow 0
⌨️ (1:26:07) [10] Caesar Cipher 1, ENV, & Hertz
⌨️ (1:32:26) [11] [11] Hex Editor, SSH, Irish Name Repo
⌨️ (1:38:57) [12] Mr. Robots, Login, & Secret Agent
⌨️ (1:46:54) [13] Truly an Artist & Assembly 1
⌨️ (1:53:04) [14] be-quick-or-be-dead 1 & blaise's cipher
⌨️ (2:00:47) [15] Buffer Overflow 1 & Hertz 2
⌨️ (2:09:16) [16} leak me & Now You See Me
⌨️ (2:15:40) [17] quackme
⌨️ (2:26:01) [18] Shellcode
⌨️ (2:30:28) [19] What Base Is This?
⌨️ (2:39:10) [20] You Cant See Me & Buttons
⌨️ (2:43:09) [21] Super Ext Magic
⌨️ (2:51:09) [22] The Vault & What's My Name
⌨️ (2:56:45) [23] Absolutely Relative
⌨️ (3:00:33) [24] Assembly 2
⌨️ (3:08:32) [25] Buffer Overflow 2
⌨️ (3:17:07) [26] Caesar Cipher 2
⌨️ (3:22:44) [27] ret2libc Exploits (got 2 learn libc)
⌨️ (3:38:50) [28] RSA Madlibs
⌨️ (3:55:54) [29] BE QUICK OR BE DEAD 2
⌨️ (4:07:37) [30] in out error
⌨️ (4:11:57) [31] Artisinal Handcrafted HTTP 3
⌨️ (4:19:55) [32] echooo
⌨️ (4:31:47) [33] learn gdb
⌨️ (4:36:34) [34] Flaskcards
--
Комментарии