this repo is for challanges in https://play.picoctf.org/practice?originalEvent=70&page=1
sure the code can be made 100x better buuuuuut it's gotta do one thing once so ¯/(°_o)/¯ . . .
i've already done Includes ; once while the teacher was talking and the other watching him, so i'm not gonna include it.
/☠\ CODE /☠\
picoCTF{M4K3_5UR3_70_CH3CK_Y0UR_1NPU75_68466E2F}
- steps:
- get their program and the source code
- add an item / length
- read the source code, realize what's at line 143
- try to log it by giving it 0
- ???
- CODE !!
/☠\ CODE /☠\
picoCTF{R0UND_N_R0UND_B6B25531}
- steps:
- read about cipher not cypher cause that will give u the 40k character (he's cool too) xD
- build a simple script "basic_mod_1.py", it's in the repo
/☠\ CODE /☠\
picoCTF{1NV3R53LY_H4RD_8A05D939}
- steps:
- /!\ there's a trick in the question so read carefully . . .
- read about the maths (⊙x⊙;)
- adjust the basic_mod_1 script to solve this one
- ???
- profit !!!!
/☠\ CODE /☠\
picoCTF{f1len@m3_m@n1pul@t10n_f0r_0b2cur17y_950c4fee}
- steps:
- /!\ this is tedious . . .
- open it with pestudio to see it's a shell file/script
- extract it thru [unshar]
- extract the result again thru [ar -x]
- extract that into a Bzip archive thru [cpio -i]
- extract it thru 7zip to get a Lzip
- change the extension to lz and thru winrar
- extract it to get an lz4 what the hell ?
- extract it thru [lzip -d] dont overwrite!
- u get something, extract it thru zip
- mv the result so u can see it
- yaaaay u got another archive !!
- u'd get another lzip
- open with winrar, ur prize is an xz
- archive
- u get a file with an ascii ??
- decode it here https://www.dcode.fr/ascii-code
- GG
- go take a walk or train i dunno ur mind needs it :X
/☠\ CODE /☠\
picoCTF{CVE-2021-34527}
- steps
- ask uncle google
/☠\ CODE /☠\
picoCTF{d3bugg3r_dr1v3_7776d758}
- steps
- follow instructions and debug the program
/☠\ CODE /☠\
picoCTF{ov3rfl0ws_ar3nt_that_bad_8ba275ff}
- steps:
- read the file, see the size limit
- enter the biggest number u think of
/☠\ CODE /☠\
picoCTF{C7r1F_54V35_71M3}
- steps:
- get the files
- load them into the script u've made
- combine them
- get the hashed code
- google it to know the algo for hashing
- decode it in python and print the result
- ???
- GG (script name is "leaking_passwords.py")
/☠\ CODE /☠\
picoCTF{3nh4nc3d_d0a757bf}
- steps:
- get the image
- open it in vscode
- get the code at the bottom
- copy it in python
"c o d e ".replace(" ", "")
- copy it and paste it in the flag thingy
/☠\ CODE /☠\
picoCTF{U51N6_Y0Ur_F1r57_F113_47cf2b7b}- steps:
- get the code, move it into ur VM
- run it xD
/☠\ CODE /☠\
picoCTF{F1r57_4rgum3n7_f65ed63e}- steps:
- get the code, move it into ur VM
- run and greet it politly ヾ(•ω•`)o
/☠\ CODE /☠\
picoCTF{1n5p3t0r_0f_h7ml_fd5d57bd}- steps:
- inspect the HTML -O-
/☠\ CODE /☠\
picoCTF{j5_15_7r4n5p4r3n7_b0c2c9cb}- steps:
- go to network tap
- log in
- gg
/☠\ CODE /☠\
picoCTF{gr3p_15_@w3s0m3_2116b979}- steps:
- get the file
- open it and ctr+f for pico
- after reading the code yea i coulda used grep or findstr but i wanted to read the anthem anyways ( ̄o ̄) . z Z . . .
/☠\ CODE /☠\
picoCTF{wh47_h47h_90d_w20u9h7}- steps:
- get the file
- look for how to decode a morse code in python, find a module
- create a script (morse_decoder.py) and volla ~!
/☠\ CODE /☠\
picoCTF{mm15_f7w!}- steps:
- get the file -> unzip it
- mmls disk.img -> find length -> get code !
/☠\ CODE /☠\
picoCTF{p4ck37_5h4rk_01b0a0d6}- steps:
- get the file -> throw it in the VM -> wireshark
- get code -> decode Hex ? ASCII ? pokemon ?? anyways python replace space . . . CODE ?!!
/☠\ CODE /☠\
picoCTF{C4n_Y0u_S33_m3_fully}- steps:
- get the file -> throw it in the VM -> Atril document viewer . . . GG
/☠\ CODE /☠\
picoCTF{WH3R3_D035_7H3_F3NC3_8361N_4ND_3ND_D00AFDD3}- steps:
- read about it
- look 4 a python example -> find this implementaion
- get key
/☠\ CODE /☠\
picoCTF{p47ch1ng_l1f3_h4ck_21d62e33}- steps:
- get the py file
- remove the checking and make it immediatly print the key xD
- profit
/☠\ CODE /☠\
picoCTF{pl3as3_l3t_m3_1nt0_th3_saf3}- steps:
- get the java source code
- modify the code so it decodes and prints the decoded message
- ???
- profit
/☠\ CODE /☠\
picoCTF{5ub5717u710n_3v0lu710n_357bf9ff}- steps:
- visit uncle google, find this
- python to lower the alpha
- got key!!
/☠\ CODE /☠\
picoctf{fr3qu3ncy_4774ck5_4r3_c001_6e0659fb}- steps:
- stay at this, press auto decode
- python to lower the alpha -> replace (j) -> (q) in the key
- got key!!
/☠\ CODE /☠\
picoCTF{n6r4m_4n41y515_15_73d10u5_42ea1770}- steps:
- usethis, calculate
- gaze upon the mess !!
- getkeyfromthemessthatitgenerted!!
/☠\ CODE /☠\
picoCTF{7R4N5P051N6_15_3XP3N51V3_A9AFB178}- steps:
- did manually thru python cause i couldn't figure out why it ignores the braces in the string
- get the code -> remove all spaces -> split at the count of 3 -> figure it out thru common sense . . . .
/☠\ CODE /☠\
picoCTF{175_chr157m45_85f5d0ac}- steps:
- make the program print
- ???
- profit !
/☠\ CODE /☠\
picoCTF{D0NT_US3_V1G3N3R3_C1PH3R_2951a89h}- steps:
- dis again
- ???
- profit !
/☠\ CODE /☠\
picoCTF{d30bfu5c4710n_f7w_5e14b257}- steps:
- make the check return (True) instead of exiting hahaahahaha
/☠\ CODE /☠\
picoCTF{d30bfu5c4710n_f7w_5e14b257}- steps:
- get the vuln file
readelf -a vuln | grep win
(win is the function that gets called if u go to the correct address)- get the adress
- apply little endian cause i saw a 32 buffer
- mess around in the terminal for 2 hrs
- figure out that tacking the little endian adress at the end will give u wierd symbols
- find that there's a binary viewer in kali called
xxd
- pipe the result to it, yey adresss
- create a script to get u the key
/☠\ CODE /☠\
picoCTF{7h3_p47h_70_5ucc355_e5a6fcbc}- steps:
../
ur way to the flag
/☠\ CODE /☠\
picoCTF{700l1ng_r3qu1r3d_2bfe1a0d}- steps:
- use JD-GUI
- open the class
- look for 10 mins cause
l
looked like a1
(╯°□°)╯︵ ┻━┻ - drink green tea
- key
/☠\ CODE /☠\
picoCTF{gr4d3_A_c00k13_0d351e23}- steps:
- crack the cokie for it is too old !
/☠\ CODE /☠\
picoCTF{50M3_3X7R3M3_1UCK_C85AF58A}- steps:
- get the source code
- read source code
- 5 hrs later
- take each function and see what they do
- strstr return a substring ; meaning it will look for the winner in the string u entered
- play
rock\paper\scissors
- break game
- feel good -> key ~!
/☠\ CODE /☠\
picoCTF{L00k5_l1k3_y0u_solv3d_it_ec8a64c7}- steps:
- basic Sql syntax
' OR 1=1;
in the pass field which tells lite that the first half can be right- inspect hidden
<p>
- get code ~ !
/☠\ CODE /☠\
picoCTF{by73_5urf3r_2f22df38}- steps:
- get the file , unzip it
- try to mount it like a normal image and dig thru the files, didn't work
- followed this to no avail
- google what the hell is a sleuthkit ?!
- start autopsy in kali
- load the image, create a new investigation . . .
- select the biggest image cause that's the file system,
1
is boot2
is swap - Analyze -> keyword search for
picoCTF
. . . nothing, tryflag.txt
, found it but it's useless QAQ - spend sometime looking
- try to file name search for
flag.txt
infile analysis
tab . . . got a location!! - export it . . . nothing o(≧口≦)o but we got a location which is
/3/root/my_folder
- go there, export both flag files -> open in VScode -> Celebrate!!
/☠\ CODE /☠\
picoCTF{L3arN_S0m3_5qL_t0d4Y_21c94904}- steps:
- connect to the instance thru the terminal
\dt
to show all tables- Select the flag from there
- steps:
file <file>
tells u the type of the file, this one is anELF 64
binary- found this
- try to debug it thru
gdb <file>
->(gdb) info file
got the main func address0x555555555160
(gdb) run
we got the app running- install and open ghidra
- load the file in it and browse the functions. . .
- land on an interesting if statement
- google the right side of the statement
0x86187
->549255
- in the running
gdb
terminal run the app, enter the code - GG
/☠\ CODE /☠\
picoCTF{1nsp3ti0n_0f_w3bpag3s_8de925a7}- steps:
- it was in *&$%@## styles.css in a comment what the hell
- steps:
- load the site into burpsuite
- look around
- get the error "failed to connect to the site
- run to google
- 30 mins lator -put spongebob meme here-
- land on this which says if u want to stop crawlers from crawling ur site add a 'robots.txt' file in which specify which endpoint are accessaple or not
- go to 'robots.txt'
- whom ever wrote this is taunting me huh
- see gibberish seperated by \n
- remember that lecture and how to recognize base64
- decode each in base64, remember the '-d' for next time xD
- get the code