Writeups of some of PicoCTF 2017 challenges.
Despite being a developer for a while, I'm not a security expert, for example my knowledge of assembly is purely academical. Therefore certain problems have been solved in "othodox" ways, if you have any suggestion or correction let me know.
So my advice to newcomers like me is: do not submit blindly the flag, read the process and try to understand and reproduce it, step by step.
Icon | Meaning |
---|---|
🕑 | Unfinished |
❓ | Solved but writeup missing |
- Forensics
- Cryptography
- Reverse engineering
- Web exploitation
- Binary exploitation
- Misc
- Master Challenge - Lazy Dev
- Forensics
- Cryptography
- Reverse engineering
- Web exploitation
- Binary exploitation
- Misc
- Master Challenge - Missing Identity
- Forensics
- Cryptography
- Reverse engineering
- Web exploitation
- Binary exploitation
- Master Challenge - WAR 🕑