stonks picoCTF

Stonks – picoCTF


Hello there, Welcome back in this post, let’s see how to CTF stonks from picoCTF. If you have any doubt, comment down below 👇🏾

I wanted to do something unique, so I built a bot that uses AI and machine learning to trade stocks for me automatically.

I’m pretty confident in its security, but if someone told me it’s not secure, I wouldn’t believe them! Also, there’s this address “nc 59616.”


After examining the file in both the ‘nc’ and reviewing the code in vuln.c, I noticed that the API token inputs were being taken and stored using memory allocation in ‘malloc’.

With that observation, if you continuously input ‘%x’ around a hundred times, you can generate it using Python3 like this:

"%x" * 100

Please note: Avoid using capital ‘X’ to generate the API key as it might cause the process to fail. Unfortunately, I’m not entirely certain of the exact reason behind this behavior.

Once you’ve generated the hexadecimal output, you can use an online tool to convert it back to ASCII characters. This conversion allows you to interpret the hexadecimal values as their corresponding text characters.

To reverse the flag, you can use a simple Python script or execute commands directly in the terminal.

This reversal process will flip the order of the characters in the flag, making it readable in the correct sequence.

s = ‘ocip{FTC0l_I4_t5m_ll0m_y_y3n841645ebÿØ}’

for x in range (0, len(s), 4):

print(s[x+3]+s[x+2]+s[x+1]+s[x], end=’ ’)

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions or brave browser to block ads. Please support us by disabling these ads blocker.Our website is made possible by displaying Ads hope you whitelist our site. We use very minimal Ads in our site


Scroll to Top