Тёмный

Deobfuscating Python Code (PicoCTF 2022 #30 'bloat.py') 

John Hammond
Подписаться 1,9 млн
Просмотров 66 тыс.
50% 1

Опубликовано:

 

29 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 44   
@getellied
@getellied 2 года назад
I love how this challenge was easy to me just because of all your malware analysis vids
@plut4580
@plut4580 2 года назад
great content John, this challenges are really great to learn every time something new. When a new malware-analysis video will come out?
@danhene6594
@danhene6594 2 года назад
Brilliant move using a python instance to translate, new to CTFs but I’ll be trying that in the future for sure
@QuickFixHicks914
@QuickFixHicks914 2 года назад
I love your content John you give me a new perspective on how to look at problems. Thank you.
@realitynowassigned
@realitynowassigned 2 года назад
Doesn't presume the viewer to be an idiot or a genius or fill the videos with fluff. It's hard to find anything like it. I learn more about python watching him dissect it in one video than anything else in several
@MarsCorporations
@MarsCorporations 2 года назад
replacing characters is so basic, this should not even count as "obfuscated" 😅
@Icelink256
@Icelink256 2 года назад
Ciphers are incredibly common in cryptography, it's just that they're usually combined with multiple other methods to further obfuscate the data. NES games used bitshifting and XOR in their passwords, for example. With a simple substitution cipher, to show the player the resulting data in a human-readable way. So, it could be written down, for later.
@sworatex1683
@sworatex1683 10 месяцев назад
This video looks like it will be scary to people that have never programmed but look absolutely easy for people with basic understanding
@kris5187
@kris5187 2 года назад
Dude, your face structure deserves some chops, no cap xD Great content as always my dude
@realitynowassigned
@realitynowassigned 2 года назад
Internet security is so broad that what is easy for 1000 is difficult for 1 and vice versa
@pravinloke4000
@pravinloke4000 Год назад
Thanks for sharing...
@bladesvlogs4965
@bladesvlogs4965 2 года назад
You make it look so easy 👍
@tappineapple3381
@tappineapple3381 2 года назад
Btw there is more than just an xor happening in the decryption algorithm.
@whoami-so2hy
@whoami-so2hy 2 года назад
thanks for sharing
@MrKyubiSasuke
@MrKyubiSasuke 2 года назад
love the content
@lordspacecake5565
@lordspacecake5565 2 года назад
Great content!!
@viv_2489
@viv_2489 2 года назад
Too many great videos unleashed
@mohitpannu27
@mohitpannu27 2 года назад
Sir… can we de-obfuscate python PyArmor
@ruthvikas
@ruthvikas Год назад
I was such a dumb guy, instead of python replacing all the strings what i did was print the index and value of that 'a' string and i manually found and replaced it. Such a dumb way to do it.
@rav04o2
@rav04o2 2 года назад
What is the purpose of the save and finish commands?
@DaniSpeh
@DaniSpeh 2 года назад
It's in one of the first picoctf videos. There was some easy challenge and time left so he created 2 scripts in bash. I think the save script saves the flag in flag.txt, if I remember correct , and finish adds _COMPLETED to the the directory name so you know the challenge is completed. You don't need those scripts to finish a challenge, they are his own quality-of-life scripts. But you'll learn some scripting watching this video
@Majed_Babili
@Majed_Babili 2 года назад
🌷❤️ Great content
@flamendless
@flamendless 2 года назад
Cant just one run the obfuscated python file?
@bhagyalakshmi1053
@bhagyalakshmi1053 Год назад
Ki dra file using coffee to paste and coming for you code minchin attend I know I see it for you this file work is very easy
@Bowzerbro
@Bowzerbro 2 года назад
Lovely
@booruledie3052
@booruledie3052 2 года назад
Great
@tom50586
@tom50586 2 года назад
bruh this isnt even obfuscation. I'd like to see you reverse a custom vm written in pure python
@xBosil
@xBosil 2 года назад
Bro i was scrolling through coments and didn't expect to find federal
@prodigyprogrammer3187
@prodigyprogrammer3187 2 года назад
Cool
@lingyong1111
@lingyong1111 2 года назад
Has Ed Sheeran changed his profession?
@andehhhhhhh
@andehhhhhhh 2 года назад
Music is just his side gig
@REALMSB
@REALMSB 2 года назад
Niceeeeeeeeeee
@Holzf43ller
@Holzf43ller 2 года назад
It seems to me, that approximately 99.999% of the Python Code i get or see looks like the obfuscated CTF-File. And always this is just the pythonic way to do things. With loads of comments like "// get np for xxx" because everyone knows that np means numpy, right? Anyway.... i like Python as a Programming language... most programming styles of this language i strongly dislike. Also: nice video
@bhagyalakshmi1053
@bhagyalakshmi1053 Год назад
Red flags
@2Craft_
@2Craft_ Год назад
someone got this for pyarmor?
@guilherme5094
@guilherme5094 2 года назад
👍
@f1rem0th
@f1rem0th 2 года назад
A good video but your solution was way overkill. Could have just returned true in arg133() that had the obvious check in it.
@RandomytchannelGD
@RandomytchannelGD Месяц назад
Hi
@jasonbourne7950
@jasonbourne7950 2 года назад
But not view
@tacos7522
@tacos7522 2 года назад
i'm no coder lol but i've deobfuscated worse stuff haha.
@Matt-nx6uu
@Matt-nx6uu 2 года назад
Haha Python -_-
@amirkiani2253
@amirkiani2253 2 года назад
First comment and like
@ophello
@ophello 2 года назад
It’s “how do they look” or “what do they look like.” Not “how do they look like.” That’s an English mistake that foreigners make, and that now native English speakers are starting to become corrupted by.
Далее
Когда Долго В Рейсе)))
00:16
Просмотров 95 тыс.
ХУДШИЕ ВЫБОРЫ в США
13:20
Просмотров 459 тыс.
Deciphering Obfuscated JavaScript Malware
31:12
Просмотров 80 тыс.
5 Useful F-String Tricks In Python
10:02
Просмотров 321 тыс.
Modifying Python Code (PicoCTF 2022 #18 'patchme.py')
10:36
5 Good Python Habits
17:35
Просмотров 583 тыс.
How Hackers Hide
20:55
Просмотров 239 тыс.
10 Crazy Python Operators That I Rarely Use
11:37
Просмотров 41 тыс.