Solving a JavaScript crackme: JS SAFE 2.0 (web) - Google CTF 2018

Channel:
Subscribers:
920,000
Published on ● Video Link: https://www.youtube.com/watch?v=8yWUaqEcXr4



Duration: 15:01
493,946 views
10,812


Solving a crackme implemented in JavaScript that attempts to obfuscate the algorithm through some anti-debugging.

Solution Script / HTML: https://gist.github.com/LiveOverflow/bbdffe3777ce0f008b452e0a789cef65
John Hammond: https://www.youtube.com/user/RootOfTheNull

-=[ ❤️ Support ]=-

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ 🐕 Social ]=-

→ Twitter: https://twitter.com/LiveOverflow/
→ Website: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/

-=[ 📄 P.S. ]=-

All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

#CTF







Tags:
Live Overflow
liveoverflow
hacking tutorial
how to hack
exploit tutorial
john hammond
google ctf
googlectf
ctf
capture the flag
capture-the-flag
ctf writeup
ctf video writeup
write-up
tutorial
crackme
anti-debugging
anti debugging
anti debug
keygen
js safe 2.0
crack me
obfuscation
obfuscated
javascript
js
java script
chrome
developer tools
reverse engineering
algorithm