Esther Adwetsessadwets.hashnode.dev·Jul 1, 2024WebDecode Pico CTF WalkthroughCategory- Web Exploitation Reward- 50 points In cyber security, it is important to have a deep knowledge of what you intend to secure. For instance, understanding how the web works, and what goes on behind the scenes can provide you with crucial insi...Discuss·3 likes·66 readspicoCTF
Esther Adwetsessadwets.hashnode.dev·May 11, 2024PicoCTF Scavenger Hunt WalkthroughThis is a straightforward guide to tackle the PicoCTF Scavenger Hunt. Get step-by-step solutions to challenges, decode flags, and boost your cybersecurity know-how. Perfect for all skill levels. Overview Points: 50 Category: Web Exploitation Descript...DiscussCTF Writeup
Niccolo Lampathedatalife.com·Apr 11, 2024picoCTF - Cookies SolutionCookies Solution This is the solution for picoCTF's Cookies challenge web exploitation problem. This problem was taken from the picoCTF 2021 and the solution will be discussed below. So proceed with caution. Clicking on the link we are redirected to...Discuss·155 readsWeb Security
Christine LuBeanshehaxalotl.hashnode.dev·Aug 22, 2023picoCTF: A Writeup for "Beginner picoMini 2022"After watching the WiCyS Capture the Flag 101 webinar on BrightTALK, I decided I ought to buckle down and work on CTFs regularly. While I've done a couple before, I never made a writeup alongside it, so I decided to knock out the "Beginner picoMini 2...Discuss·1 like·111 readspicoCTF
Matthew Hardmatthewhard.com·Jun 6, 2023PicoCTF Walkthrough: Obedient CatWelcome, future cybersecurity enthusiasts! I'm here to guide you through the exciting world of Capture The Flag (CTF) competitions. In this article, we'll embark on our first challenge together: Obedient Cat from PicoCTF. This walkthrough is tailored...Discuss·549 readsPicoCTFCTF
Anshul Negianshulnegi.hashnode.dev·Mar 11, 2023Get Started with Cybersecurity: A Beginner's Guide to Capture the Flag and picoCTFIntroduction Welcome to the world of cybersecurity! Cyber Security could be very intimidating when you think about hackers doing super cool stuff on their black screens. Still, it could be tough and challenging to get started with it. Suppose you sea...Discuss·6 likes·144 reads#cybersecurity
Nouman Rahmanprogrammingfire.hashnode.dev·Oct 15, 2022picoCTF 2022: Cryptography: credstuffIntroduction Challenge: credstuff Category: Cryptography Description: We found a leak of a black-market website's login credentials. Can you find the password of the user cultiris and successfully decrypt it? Download the leak here. The first user in...Discuss·10 likes·929 readspicoCTF 2022Cryptography
Nouman Rahmanprogrammingfire.hashnode.dev·Oct 15, 2022picoCTF 2022: Binary Exploitation: buffer overflow 0Introduction Challenge: buffer overflow 0 Category: Binary Exploitation Description: Smash the stack. Let's start off simple, can you overflow the correct buffer? The program is available here. You can view the source here. And connect with it using:...Discuss·10 likes·1.6K readspicoCTF 2022Binary Exploitation
Nouman Rahmanprogrammingfire.hashnode.dev·Oct 14, 2022picoCTF 2022: Cryptography: basic-mod-2Introduction Challenge: basic-mod-2 Category: Cryptography Description: A new modular challenge! Download the message here. Take each number mod 41 and find the modular inverse for the result. Then map to the following character set: 1-26 are the al...Discuss·10 likes·973 readspicoCTF 2022Cryptography
Nouman Rahmanprogrammingfire.hashnode.dev·Oct 14, 2022picoCTF 2022: Cryptography: basic-mod1Introduction Challenge: basic-mod1 Category: Cryptography Description: We found this weird message being passed around on the servers, we think we have a working decryption scheme. Download the message here. Take each number mod 37 and map it to the ...Discuss·10 likes·1.1K readspicoCTF 2022Cryptography