Category: picoCTF
-
picoCTF : crackme-py
Download the python file and examine the code. The flag is encrypted Encrypted flag is stored in line 4 lines 3 and 9 shows that the cipher used is ROT47 Use cyberchef to get the flag.
-
picoCTF : asm1
The source gives us a text file that contains Assembly code. The argument given is 0x6fa = 1786 To get the flag subtract 0x12 from 0x6fa.
-
picoCTF : GDB Test Drive
Run GDB and set the layout. Set a breakpoint at call function sleep@plt jump to the variable [rbp-0x30] to find the flag.
-
picoCTF : Bbbbloat
Test out the program. Start up Ghidra and analyze the file. Flag is hard coded in the program.
-
picoCTF : Tab, Tab, Attack
Use the tab command to scroll through the files faster till reach a ELF and the flag will be found.
-
picoCTF : Static ain’t always noise
Flag can be obtained easily from the strings command.
-
picoCTF : vault-door-training
Flag can be obtained easily from reading the java source code.
-
picoCTF : file-run2
The flag can be obtained easily from running the file. 2rd Method Using Ghidra
-
picoCTF : file-run1
The flag can be obtained easily from running the file. 2nd Method 3rd Method Using Ghidra