2022-03-24
[public] 9.5K views, 2.92K likes, dislikes audio only
Celebrating my 10 years of hacking and my 7 years on YouTube!
In 2012 I came across my first hacking CTF. Stripe organized a Capture the Flag competition with 6 levels to learn about different vulnerabilities. This is what it all started for me.
Cyber Security Challenge Germany: https://cscg.live
NFITS donations: https://nfits.de/spenden/
Stripe CTF Announcement https://stripe.com/blog/capture-the-flag
CTF Wrap Up https://web.archive.org/web/20120531152105/https://stripe.com/blog/capture-the-flag-wrap-up
Files/Sources: https://github.com/stripe-ctf/stripe-ctf
io.smashthestack: https://io.netgarage.org/
ey! Look for patterns /youtube/video/Jpaq0QkepgA
Sudo Exploit Walkthrough /youtube/video/TLa2VqcGGEQ
GitLab 11.4.7 Remote Code Execution - Real World CTF 2018 /youtube/video/LrLJuyAdoAg
Chapters:
00:00 - Background Story
01:27 - The StripeCTF Blogpost
03:11 - Setting up StripeCTF VM
04:01 - level01: system()
05:50 - level02: PHP Path Traversal
07:10 - level03: Array OOB
10:57 - level04: Buffer Overflow
14:13 - level05: Python Pickle
17:04 - level06: Timing Attack
19:28 - CTF Playing vs. Reading Writeups
20:57 - level06: Blocked I/O
24:21 - Reflecting on the CTF
26:02 - Cyber Security Challenge Germany
28:03 - To Be Continued...
-=[ ā¤ļø Support ]=-
ā per Video: https://www.patreon.com/join/liveoverflow
ā per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
-=[ š Social ]=-
ā Twitter: https://twitter.com/LiveOverflow/
ā Instagram: https://instagram.com/LiveOverflow/
ā Blog: https://liveoverflow.com/
ā Subreddit: https://www.reddit.com/r/LiveOverflow/
ā Facebook: https://www.facebook.com/LiveOverflow/