Cybernotes
  • 🚩 CTF
  • 🥷🏼 Cyber Security
  • 🤖 Data Science
  • 🧠 Psychology
  • 🧬 Neuroscience
Sign in Subscribe
PicoCTF - PW Crack 1
picoCTF

PicoCTF - PW Crack 1

First, dowload both the files in store them in the same directory. (level1.py and level1.flag.txt.enc). Open up the level1.py using your favorite editor or with the following command from the terminal. nano level1.py ### THIS FUNCTION WILL NOT HELP YOU FIND THE FLAG --LT ######################## def
23 Jun 2023 1 min read
PicoCTF - HashingJobApp
picoCTF

PicoCTF - HashingJobApp

First, open up the terminal and using the following command initiate a connection with the server. nc saturn.picoctf.net 57689 You have to md5 hash the presented text between quotes. To do that, you can apply this command. echo -n "cholesterol" | md5sum md5sum is used to verify
23 Jun 2023 1 min read
PicoCTF - Glitch Cat
picoCTF

PicoCTF - Glitch Cat

Open up the terminal and type the following command. nc saturn.picoctf.net 51109 You will get an output. Copy that output and open up a terminal and type the following command. python3 print('picoCTF{gl17ch_m3_n07_' + chr(0x62) + chr(0x64) + chr(0x61) + chr(0x36) + chr(0x38)
23 Jun 2023 1 min read
PicoCTF - fixme2.py
picoCTF

PicoCTF - fixme2.py

Download the fixme2.py file, open it in an editor and change it to the following. import random def str_xor(secret, key): #extend key to secret length new_key = key i = 0 while len(new_key) < len(secret): new_key = new_key + key[i] i = (i + 1) % len(
23 Jun 2023 1 min read
PicoCTF - fixme1.py
picoCTF

PicoCTF - fixme1.py

Download the fixme1.py file, open it in an editor and change it to the following. import random def str_xor(secret, key): #extend key to secret length new_key = key i = 0 while len(new_key) < len(secret): new_key = new_key + key[i] i = (i + 1) % len(
23 Jun 2023 1 min read
PicoCTF - convertme.py
picoCTF

PicoCTF - convertme.py

First, download the convert.py file. Run it with the folllowing command. python3 convert.py You are prompted with the following text. If 15 is in decimal base, what is it in binary base? Every decimal number has a representation in a binary form. For example, take the number 3,
23 Jun 2023 1 min read
PicoCTF - Codebook
picoCTF

PicoCTF - Codebook

First download in the same directory code.py and codebook.txt Then run the following command and you’ve got the flag. python3 code.py
23 Jun 2023
PicoCTF - First Grep
picoCTF

PicoCTF - First Grep

First, download the file. Then navigate to the destination of the file and in terminal type the following command. grep 'picoCTF' file The command grep ‘picoCTF’ just searches through the file and prints the string that contains picoCTF.
23 Jun 2023
PicoCTF - Bases
picoCTF

PicoCTF - Bases

What does this bDNhcm5fdGgzX3IwcDM1 mean? I think it has something to do with bases. Run the following command in the terminal. echo 'bDNhcm5fdGgzX3IwcDM1' | base64 -d Engulf the output inside picoCTF{output} But, let’s look a little deeper. The base64 command encodes binary strings into text representations using
23 Jun 2023 1 min read
PicoCTF - strings it
picoCTF

PicoCTF - strings it

Download strings file and type the following command in the terminal. strings strings | grep picoCTF If you want to learn more about strings type the following command. man strings So, in a sense the strings command prints printable strings in a binary or object file. The second part of the
23 Jun 2023
PicoCTF - What's a net cat?
picoCTF

PicoCTF - What's a net cat?

Using netcat (nc) is going to be pretty important. Can you connect to jupiter.challenges.picoctf.org at port 25103 to get the flag? Open up the terminal and type the following command. nc jupiter.challenges.picoctf.org 25103 You’ve got the flag. If you want to learn more
23 Jun 2023
PicoCTF - 2Warm
picoCTF

PicoCTF - 2Warm

Can you convert the number 42 (base 10) to binary (base 2)? Every decimal number has a representation in a binary form. For example, take the number 3, which is in the decimal format. In the binary form it is equal to ‘11’. If you want to learn about this,
23 Jun 2023 1 min read
PicoCTF - Warmed up
picoCTF

PicoCTF - Warmed up

What is 0x3D (base 16) in decimal (base 10)? There is a thing called ASCII table that contains data in different formats. For example, the ASCII 65 corresponds to the HEX -> 41 and the symbol ‘A’. These values are all equal, but in different representations. You can take
23 Jun 2023 1 min read
PicoCTF - Lets Warm Up
picoCTF

PicoCTF - Lets Warm Up

If I told you a word started with 0x70 in hexadecimal, what would it start with in ASCII? There is a thing called ASCII table that contains data in different formats. For example, the ASCII 65 corresponds to the HEX -> 41 and the symbol ‘A’. These values are
23 Jun 2023 1 min read
PicoCTF - Magikarp Ground Mission
picoCTF

PicoCTF - Magikarp Ground Mission

In this CTF, we will learn about SSH, ls and cat. If you know nothing about these terms, do not worry, we will cover them right now. You can always use the following commands to learn more about them in the terminal. man ssh man ls In a short, ssh
23 Jun 2023 2 min read
PicoCTF - Tab Tab Attack
picoCTF

PicoCTF - Tab Tab Attack

First dowload the Addadshashanammu.zip file. Run the following command to unzip its contents. unzip -u Addadshashanammu.zip Then change directory to Addadshashanammu cd Addadshashanammu/ We noticed that there are a lot of folders inside each one. So, we can either use Tab to autocomplete the path to the folders,
23 Jun 2023 1 min read
PicoCTF - Static ain't always noise
picoCTF

PicoCTF - Static ain't always noise

Download all files, (static and ltdis.sh) cat static Provides an output that includes the flag itself. However, we will look into ltdis.sh to learn more about it. cat ltdis.sh Inside the program, we can see PHP code that we can use to our advantage. else echo "
23 Jun 2023 1 min read
PicoCTF -Nice Netcat
picoCTF

PicoCTF -Nice Netcat

Run the following command. nc mercury.picoctf.net 35652 returns an output of numbers in decimal format. We have to create a python script in order to convert from this decimal output to ASCII text. First save the output to a file named flag.txt nc mercury.picoctf.net 35652
23 Jun 2023 1 min read
PicoCTF - Wave a Flag
picoCTF

PicoCTF - Wave a Flag

Download the warm program. cat warm; returns Hello user! Pass me a -h to learn what I can do!-hOh, help? I actually don’t do much, but I do have this flag here: We can already see the flag here, but we can take it a step further. Give
23 Jun 2023
PicoCTF - Python Wrangling
picoCTF

PicoCTF - Python Wrangling

Download the python script, pw.txt and flag.txt.en. cat pw.txt cat flag.txt.en python3 ende.py -d flag.txt.en Enter the password of pw.txt and you get the flag. import sys import base64 from cryptography.fernet import Fernet usage_msg = "Usage: "+ sys.
23 Jun 2023 1 min read
PicoCTF - Obedient Cat
picoCTF

PicoCTF - Obedient Cat

Let's start on a fresh journey together, gaining knowledge on the Cyber Security field by gaining experience on CTF events. We will start with PicoCTF. Download the file and use the following command in the terminal. cat flag;
23 Jun 2023
← Newer Posts Page 3 of 3
Cybernotes © 2026
Powered by Ghost