picoCTF PicoCTF - Codebook First download in the same directory code.py and codebook.txt Then run the following command and you’ve got the flag. python3 code.py
picoCTF PicoCTF - First Grep First, download the file. Then navigate to the destination of the file and in terminal type the following command. grep 'picoCTF' file The command grep ‘picoCTF’ just searches through the file and prints the string that contains picoCTF.
picoCTF PicoCTF - Bases What does this bDNhcm5fdGgzX3IwcDM1 mean? I think it has something to do with bases. Run the following command in the terminal. echo 'bDNhcm5fdGgzX3IwcDM1' | base64 -d Engulf the output inside picoCTF{output} But, let’s look a little deeper. The base64 command encodes binary strings into text representations using
picoCTF PicoCTF - strings it Download strings file and type the following command in the terminal. strings strings | grep picoCTF If you want to learn more about strings type the following command. man strings So, in a sense the strings command prints printable strings in a binary or object file. The second part of the
picoCTF PicoCTF - What's a net cat? Using netcat (nc) is going to be pretty important. Can you connect to jupiter.challenges.picoctf.org at port 25103 to get the flag? Open up the terminal and type the following command. nc jupiter.challenges.picoctf.org 25103 You’ve got the flag. If you want to learn more
picoCTF PicoCTF - 2Warm Can you convert the number 42 (base 10) to binary (base 2)? Every decimal number has a representation in a binary form. For example, take the number 3, which is in the decimal format. In the binary form it is equal to ‘11’. If you want to learn about this,
picoCTF PicoCTF - Warmed up What is 0x3D (base 16) in decimal (base 10)? There is a thing called ASCII table that contains data in different formats. For example, the ASCII 65 corresponds to the HEX -> 41 and the symbol ‘A’. These values are all equal, but in different representations. You can take
picoCTF PicoCTF - Lets Warm Up If I told you a word started with 0x70 in hexadecimal, what would it start with in ASCII? There is a thing called ASCII table that contains data in different formats. For example, the ASCII 65 corresponds to the HEX -> 41 and the symbol ‘A’. These values are
picoCTF PicoCTF - Magikarp Ground Mission In this CTF, we will learn about SSH, ls and cat. If you know nothing about these terms, do not worry, we will cover them right now. You can always use the following commands to learn more about them in the terminal. man ssh man ls In a short, ssh
picoCTF PicoCTF - Tab Tab Attack First dowload the Addadshashanammu.zip file. Run the following command to unzip its contents. unzip -u Addadshashanammu.zip Then change directory to Addadshashanammu cd Addadshashanammu/ We noticed that there are a lot of folders inside each one. So, we can either use Tab to autocomplete the path to the folders,
picoCTF PicoCTF - Static ain't always noise Download all files, (static and ltdis.sh) cat static Provides an output that includes the flag itself. However, we will look into ltdis.sh to learn more about it. cat ltdis.sh Inside the program, we can see PHP code that we can use to our advantage. else echo "
picoCTF PicoCTF -Nice Netcat Run the following command. nc mercury.picoctf.net 35652 returns an output of numbers in decimal format. We have to create a python script in order to convert from this decimal output to ASCII text. First save the output to a file named flag.txt nc mercury.picoctf.net 35652
picoCTF PicoCTF - Wave a Flag Download the warm program. cat warm; returns Hello user! Pass me a -h to learn what I can do!-hOh, help? I actually don’t do much, but I do have this flag here: We can already see the flag here, but we can take it a step further. Give
picoCTF PicoCTF - Python Wrangling Download the python script, pw.txt and flag.txt.en. cat pw.txt cat flag.txt.en python3 ende.py -d flag.txt.en Enter the password of pw.txt and you get the flag. import sys import base64 from cryptography.fernet import Fernet usage_msg = "Usage: "+ sys.
picoCTF PicoCTF - Obedient Cat Let's start on a fresh journey together, gaining knowledge on the Cyber Security field by gaining experience on CTF events. We will start with PicoCTF. Download the file and use the following command in the terminal. cat flag;