picoCTF 2018
Forensics Warmup 1 - Points: 50
Can you unzip this file for me and retreive the flag?
解压得到图片
picoCTF{welcome_to_forensics}
Forensics Warmup 2 - Points: 50
Hmm for some reason I can’t open this PNG? Any ideas?
其实是jpg文件
picoCTF{extensions_are_a_lie}
General Warmup 1 - Points: 50
If I told you your grade was 0x41 in hexadecimal, what would it be in ASCII?
picoCTF{A}
General Warmup 2 - Points: 50
Can you convert the number 27 (base 10) to binary (base 2)?
picoCTF{11011}
General Warmup 3 - Points: 50
What is 0x3D (base 16) in decimal (base 10).
picoCTF{61}
Resources - Points: 50
We put together a bunch of resources to help you out on our website! If you go over there, you might even find a flag! https://picoctf.com/resources (link)
picoCTF{xiexie_ni_lai_zheli}
Reversing Warmup 1
Throughout your journey you will have to run many programs. Can you navigate to /problems/reversing-warmup-1_4_6b2499250c4624337a1948ac374c4934 on the shell server and run this program to retreive the flag?
picoCTF{welc0m3_t0_r3VeRs1nG}
Reversing Warmup 2
Can you decode the following string dGg0dF93NHNfczFtcEwz
from base64 format to ASCII?
picoCTF{th4t_w4s_s1mpL3}
Crypto Warmup 1
Crpyto can often be done by hand, here’s a message you got from a friend, llkjmlmpadkkc with the key of thisisalilkey. Can you use this table to solve it?.
1 | A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
picoCTF{SECRETMESSAGE}
Crypto Warmup 2
Cryptography doesn’t have to be complicated, have you ever heard of something called rot13? cvpbPGS{guvf_vf_pelcgb!}
picoCTF{this_is_crypto!}
grep 1 - Points: 75
Can you find the flag in file? This would be really obnoxious to look through by hand, see if you can find a faster way. You can also find the file in /problems/grep-1_3_8d9cff3d178c231ab735dfef3267a1c2 on the shell server.
1 | cat file | grep "CTF" |
picoCTF{grep_and_you_will_find_cdf2e7c2}
net cat - Points: 75
Using netcat (nc) will be a necessity throughout your adventure. Can you connect to 2018shell1.picoctf.com at port 10854 to get the flag?
1 | nc 2018shell1.picoctf.com 10854 |
picoCTF{NEtcat_iS_a_NEcESSiTy_c97963fe}
strings - Points: 100
Can you find the flag in this file without actually running it? You can also find the file in /problems/strings_1_c7bac958dd6a4b695dc72446d8014f59 on the shell server.
1 | strings strings | grep CTF |
picoCTF{sTrIngS_sAVeS_Time_d7c8de6c}
pipe
During your adventure, you will likely encounter a situation where you need to process data that you receive over the network rather than through a file. Can you find a way to save the output from this program and search for the flag? Connect with 2018shell1.picoctf.com 48696.
1 | nc 2018shell1.picoctf.com 48696 > ctf.txt |
picoCTF{almost_like_mario_f617d1d7}
Inspect Me
Inpect this code! http://2018shell1.picoctf.com:53213 (link)
1 | <!-- I learned HTML! Here's part 1/3 of the flag: picoCTF{ur_4_real_1nspe --> |
picoCTF{ur_4_real_1nspect0r_g4dget_402b0bd3}
grep 2
This one is a little bit harder. Can you find the flag in /problems/grep-2_1_ef31faa711ad74321a7467978cb0ef3a/files on the shell server? Remember, grep is your friend.
1 | grep picoCTF . -r |
picoCTF{grep_r_and_you_will_find_4baaece4}
Client Side is Still Bad
I forgot my password again, but this time there doesn’t seem to be a reset, can you help me? http://2018shell1.picoctf.com:8930 (link)
1 | function verify() { |
picoCTF{client_is_bad_d0ebbd}
admin panel
We captured some traffic logging into the admin panel, can you find the password?
1 | ))yE|@@~P0].[T |
picoCTF{n0ts3cur3_13597b43}