### Forensics Warmup 1 - Points: 50

Can you unzip this file for me and retreive the flag?

picoCTF{welcome_to_forensics}

### Forensics Warmup 2 - Points: 50

Hmm for some reason I can’t open this PNG? Any ideas?

picoCTF{extensions_are_a_lie}

picoCTF{A}

### General Warmup 2 - Points: 50

Can you convert the number 27 (base 10) to binary (base 2)?

picoCTF{11011}

### General Warmup 3 - Points: 50

What is 0x3D (base 16) in decimal (base 10).

picoCTF{61}

### Resources - Points: 50

We put together a bunch of resources to help you out on our website! If you go over there, you might even find a flag! https://picoctf.com/resources (link)

picoCTF{xiexie_ni_lai_zheli}

### Reversing Warmup 1

Throughout your journey you will have to run many programs. Can you navigate to /problems/reversing-warmup-1_4_6b2499250c4624337a1948ac374c4934 on the shell server and run this program to retreive the flag?

picoCTF{welc0m3_t0_r3VeRs1nG}

### Reversing Warmup 2

Can you decode the following string dGg0dF93NHNfczFtcEwz from base64 format to ASCII?

picoCTF{th4t_w4s_s1mpL3}

### Crypto Warmup 1

Crpyto can often be done by hand, here’s a message you got from a friend, llkjmlmpadkkc with the key of thisisalilkey. Can you use this table to solve it?.

picoCTF{SECRETMESSAGE}

### Crypto Warmup 2

Cryptography doesn’t have to be complicated, have you ever heard of something called rot13? cvpbPGS{guvf_vf_pelcgb!}

picoCTF{this_is_crypto!}

### grep 1 - Points: 75

Can you find the flag in file? This would be really obnoxious to look through by hand, see if you can find a faster way. You can also find the file in /problems/grep-1_3_8d9cff3d178c231ab735dfef3267a1c2 on the shell server.

picoCTF{grep_and_you_will_find_cdf2e7c2}

### net cat - Points: 75

Using netcat (nc) will be a necessity throughout your adventure. Can you connect to 2018shell1.picoctf.com at port 10854 to get the flag?

picoCTF{NEtcat_iS_a_NEcESSiTy_c97963fe}

### strings - Points: 100

Can you find the flag in this file without actually running it? You can also find the file in /problems/strings_1_c7bac958dd6a4b695dc72446d8014f59 on the shell server.

picoCTF{sTrIngS_sAVeS_Time_d7c8de6c}

### pipe

During your adventure, you will likely encounter a situation where you need to process data that you receive over the network rather than through a file. Can you find a way to save the output from this program and search for the flag? Connect with 2018shell1.picoctf.com 48696.

picoCTF{almost_like_mario_f617d1d7}

### Inspect Me

picoCTF{ur_4_real_1nspect0r_g4dget_402b0bd3}

### grep 2

This one is a little bit harder. Can you find the flag in /problems/grep-2_1_ef31faa711ad74321a7467978cb0ef3a/files on the shell server? Remember, grep is your friend.

picoCTF{grep_r_and_you_will_find_4baaece4}

### Client Side is Still Bad

I forgot my password again, but this time there doesn’t seem to be a reset, can you help me? http://2018shell1.picoctf.com:8930 (link)