Scan Surprise | PicoCTF 2024
I got this photo after unziping the file and I scanned this photo : And I got the flag
Scan Surprise | PicoCTF 2024 Read More »
I got this photo after unziping the file and I scanned this photo : And I got the flag
Scan Surprise | PicoCTF 2024 Read More »
Introduction Topic – Forensics | | | 50 points This challenge requires combining various skills such as grep, googling, and executing a script. In this post, I will share my thought process and the steps I took to solve the challenge. Note: I completed this challenge with limited prior knowledge of the skills involved. On
Verify | Pico CTF 2024 Read More »
Introduction This blog talks about how to solve the GET aHEAD challenge, which is one of the tasks in the picoCTF Web Exploitation section. Solution Here’s what you need to do: There’s a flag hidden on a server. You can access it through this link: http://mercury.picoctf.net:21939/ Just open the link in your web browser and
GET aHEAD Pico CTF Writeup Read More »
Introduction Hello there, Welcome back in this post, let’s see how to CTF stonks from picoCTF. If you have any doubt, comment down below 👇🏾 I wanted to do something unique, so I built a bot that uses AI and machine learning to trade stocks for me automatically. I’m pretty confident in its security, but
Introduction Question: There is a nice program that you can talk to by using this command in a shell: $ nc mercury.picoctf.net 49039, but it doesn’t speak English… Overview and Solving Hey there! So, there’s this neat program you can chat with using a specific command in the terminal: $ nc mercury.picoctf.net 49039. The catch is,
picoCTF – Nice Netcat Read More »
Introduction PicoCTF’s Information challenge is fascinating because it prompts us to ponder the numerous methods available to conceal information. It’s surprising how even the most basic file can encompass a multitude of secrets. Let me present the challenge: Overview and Solving The task involves an image named “cat.jpg” that can be downloaded for a closer
picoCTF – information Read More »
Introduction Question: Can you invoke help flags for a tool or binary? This program has extraordinarily helpful information… Files: warm Overview & Solving Approach: After downloading the file running the command file warm shows it as an executable file. When we try to run using ./warm It gives error. One of the reason might be that it
picoCTF – Wave a Flag Read More »
Introduction It seems like the Python script needs to be run similar to how you’d run a program in the Terminal. The goal is to use a specific password to execute this script and retrieve the flag. You’ll find the Python script, a file containing passwords, and another file with the flag attached. Overview and
picoCTF – Python Wrangling Read More »
Introduction This is a web question, it seems to be linked to the one before corCTFmsfroggenerator, hahacorCTF Flag was mentionedshould have rendered client side, but this time it was finally implemented All in all, this question tests your familiarity with various browser features and back-end services. The overall ability is relatively strong, I will give
picoCTF – msfroggenerator2 Read More »
Introduction WebNet0 is a forensics puzzle worth 350 points. The challenge’s description is We found this packet capture and key. Recover the flag. This puzzle presents a pcap file capture.pcap and a key picopico.key The key is a private key: % cat picopico.key —–BEGIN PRIVATE KEY—– MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQCwKlFPNKjseJF5 puCJU5x38XcT1eQge5zOKNahAlYudvGVOEs61TnIgvcER4ko8i3OCwak2/atcGk3 oz9jFKep7XFEYNP31IwwD9j/YazlKy4DRLGObOyIZUU1f2WRA7Uhf0POQXsDT1oU X32jMKZkQSSDW4MRZd9trJYdO2TrcEPMsBiZQlFlvgnNwl3QlawozTHLAJKI36j1 cPwSMMeNca1e0Zi1s7R5IxfhpNXOBF0FmxiWvmeOHbaspyHg8UEmGBrkd4k4wXSK GQvrc8QjycP4ScEdquxJiYnDT8iEbAq70/7f/5NIN1DE9YoGJqKYjTS9nRPB4Yvj JN/SJnhvAgMBAAECggEACCnd3LrG/TZVH3sROqvqO1CwQPYPfUXdLVyNHab7EWon pc+XBOHurJENG2CpRYF7h+nQ5ADhfIYSCicBf/jsEB7VueJ20CxEVtHVL3h6R6Bp oHMle0Em8OcofuMpdL/kO+om3T8BkVSzCvCl5NMTUuAF7iRmfX7oDLALwM0IzzQv 2un+2UmT15rgAZfl3IL1PGvJhbhLxfeeyPE9MBy1SqBjQ9rNFn8sQv959J6BHz4b EpK//ErtNP2yh7oiVBBgKEQ1gEuOjQC/4oxoqCFfZaf9XNRCxB/zY1nUprvJyz09 NMQWNF2EmvmBVGfoTxmuut5N0GbVr2UyHxWMKm2sOQKBgQDpb2+AWgWlGtetuLKJ
picoCTF – WebNet0picoCTF Read More »