Niccolo Lampathedatalife.com·Apr 11, 2024picoCTF - Cookies SolutionCookies Solution This is the solution for picoCTF's Cookies challenge web exploitation problem. This problem was taken from the picoCTF 2021 and the solution will be discussed below. So proceed with caution. Clicking on the link we are redirected to...DiscussWeb Security
Christine LuBeanforSheHaxalotlshehaxalotl.christinelubean.com·Aug 22, 2023picoCTF: A Writeup for "Beginner picoMini 2022"After watching the WiCyS Capture the Flag 101 webinar on BrightTALK, I decided I ought to buckle down and work on CTFs regularly. While I've done a couple before, I never made a writeup alongside it, so I decided to knock out the "Beginner picoMini 2...Discuss·1 like·82 readspicoCTF
Matthew Hardmatthewhard.com·Jun 6, 2023PicoCTF Walkthrough: Obedient CatWelcome, future cybersecurity enthusiasts! I'm here to guide you through the exciting world of Capture The Flag (CTF) competitions. In this article, we'll embark on our first challenge together: Obedient Cat from PicoCTF. This walkthrough is tailored...Discuss·363 readsPicoCTFCTF
Anshul Negianshulnegi.hashnode.dev·Mar 11, 2023Get Started with Cybersecurity: A Beginner's Guide to Capture the Flag and picoCTFIntroduction Welcome to the world of cybersecurity! Cyber Security could be very intimidating when you think about hackers doing super cool stuff on their black screens. Still, it could be tough and challenging to get started with it. Suppose you sea...Discuss·6 likes·176 reads#cybersecurity
Nouman Rahmanprogrammingfire.hashnode.dev·Oct 15, 2022picoCTF 2022: Cryptography: credstuffIntroduction Challenge: credstuff Category: Cryptography Description: We found a leak of a black-market website's login credentials. Can you find the password of the user cultiris and successfully decrypt it? Download the leak here. The first user in...Discuss·10 likes·929 readspicoCTF 2022Cryptography
Nouman Rahmanprogrammingfire.hashnode.dev·Oct 15, 2022picoCTF 2022: Binary Exploitation: buffer overflow 0Introduction Challenge: buffer overflow 0 Category: Binary Exploitation Description: Smash the stack. Let's start off simple, can you overflow the correct buffer? The program is available here. You can view the source here. And connect with it using:...Discuss·10 likes·2.0K readspicoCTF 2022Binary Exploitation
Nouman Rahmanprogrammingfire.hashnode.dev·Oct 14, 2022picoCTF 2022: Cryptography: basic-mod-2Introduction Challenge: basic-mod-2 Category: Cryptography Description: A new modular challenge! Download the message here. Take each number mod 41 and find the modular inverse for the result. Then map to the following character set: 1-26 are the al...Discuss·10 likes·1.3K readspicoCTF 2022Cryptography
Nouman Rahmanprogrammingfire.hashnode.dev·Oct 14, 2022picoCTF 2022: Cryptography: basic-mod1Introduction Challenge: basic-mod1 Category: Cryptography Description: We found this weird message being passed around on the servers, we think we have a working decryption scheme. Download the message here. Take each number mod 37 and map it to the ...Discuss·10 likes·1.4K readspicoCTF 2022Cryptography
Nouman Rahmanprogrammingfire.hashnode.dev·Oct 14, 2022picoCTF 2022: Binary Exploitation: basic-file-exploitIntroduction Challenge: basic-file-exploit Category: Binary Exploitation Description: The program provided allows you to write to a file and read what you wrote from it. Try playing around with it and see if you can break it! Connect to the program ...Discuss·10 likes·1.0K readspicoCTF 2022picoCTF 2022
Ujjawal Sainiblog.ujjawalsaini.me·Oct 6, 2022PicoCTF 2022 Forensics walkthrough – Part 2In this article, we will attempt to solve picoCTF 2022 Forensics challenges 4 to 9. Link to Part - 1 Let's get started! Challenge 4 - Packets Primer The description says to download the linked packet capture file and analyse it. Let's start by open...DiscussCTF