Skip to content
Permalink
Branch: master
Find file Copy path
Find file Copy path
Fetching contributors…
Cannot retrieve contributors at this time
109 lines (73 sloc) 1.97 KB
title tags
picoCTF 2018
picoCTF
2018

Overview

https://2018game.picoctf.com/problems solved in bash and js.

Forensics Warmup 1

#forensics #50pt #unzip

Can you unzip this file for me and retreive the flag?

picoCTF{welcome_to_forensics}

unzip flag.zip
# get flag in image

Forensics Warmup 2

#forensics #50pt

Hmm for some reason I can't open this PNG? Any ideas?

picoCTF{extensions_are_a_lie}

file flag.png
mv flag.png flag.jpeg
# get flag in image

General Warmup 1

#general #50pt #bc #ascii

If I told you your grade was 0x41 in hexadecimal, what would it be in ASCII?

picoCTF{A}

echo "41" | xxd -r -p

General Warmup 2

#general #50pt #bases

Can you convert the number 27 (base 10) to binary (base 2)?

picoCTF{11011}

echo "obase=2; ibase=10; 27" | bc

General Warmup 3

#general #50pt #bases

What is 0x3D (base 16) in decimal (base 10).

picoCTF{61}

echo "obase=10; ibase=16; 3D" | bc

Resources

#general

We put together a bunch of resources to help you out on our website! If you go over there, you might even find a flag! https://picoctf.com/resources (link)

picoCTF{xiexie_ni_lai_zheli}

Reversing Warmup 1

#reversing #50pt

Throughout your journey you will have to run many programs. Can you navigate to /problems/reversing-warmup-1_0_f99f89de33522c93964bdec49fb2b838 on the shell server and run this program to retreive the flag?

picoCTF{welc0m3_t0_r3VeRs1nG}

Simply run ./run in the shell server

Reversing Warmup 2

#reversing #50pt #ascii

Can you decode the following string dGg0dF93NHNfczFtcEwz from base64 format to ASCII?

picoCTF{th4t_w4s_s1mpL3}

echo "dGg0dF93NHNfczFtcEwz" | base64 -D

Crypto Warmup 1

#cryptography #75pt

Crpyto can often be done by hand, here's a message you got from a friend, llkjmlmpadkkc with the key of thisisalilkey. Can you use this table to solve it?.

``

You can’t perform that action at this time.