Nouman Rahmanprogrammingfire.hashnode.dev·Oct 15, 2022picoCTF 2022: Cryptography: credstuffIntroduction Challenge: credstuff Category: Cryptography Description: We found a leak of a black-market website's login credentials. Can you find the password of the user cultiris and successfully decrypt it? Download the leak here. The first user in...10 likes·632 readspicoCTF 2022Cryptography
Nouman Rahmanprogrammingfire.hashnode.dev·Oct 15, 2022picoCTF 2022: Binary Exploitation: buffer overflow 0Introduction Challenge: buffer overflow 0 Category: Binary Exploitation Description: Smash the stack. Let's start off simple, can you overflow the correct buffer? The program is available here. You can view the source here. And connect with it using:...10 likes·1.6K readspicoCTF 2022Binary Exploitation
Nouman Rahmanprogrammingfire.hashnode.dev·Oct 14, 2022picoCTF 2022: Cryptography: basic-mod-2Introduction Challenge: basic-mod-2 Category: Cryptography Description: A new modular challenge! Download the message here. Take each number mod 41 and find the modular inverse for the result. Then map to the following character set: 1-26 are the al...10 likes·973 readspicoCTF 2022Cryptography
Nouman Rahmanprogrammingfire.hashnode.dev·Oct 14, 2022picoCTF 2022: Cryptography: basic-mod1Introduction Challenge: basic-mod1 Category: Cryptography Description: We found this weird message being passed around on the servers, we think we have a working decryption scheme. Download the message here. Take each number mod 37 and map it to the ...10 likes·1.1K readspicoCTF 2022Cryptography
Nouman Rahmanprogrammingfire.hashnode.dev·Oct 14, 2022picoCTF 2022: Binary Exploitation: basic-file-exploitIntroduction Challenge: basic-file-exploit Category: Binary Exploitation Description: The program provided allows you to write to a file and read what you wrote from it. Try playing around with it and see if you can break it! Connect to the program ...10 likes·1.0K readspicoCTF 2022picoCTF 2022
Ujjawal Sainiujjawalsaini.hashnode.dev·Oct 6, 2022PicoCTF 2022 Forensics walkthrough – Part 2In this article, we will attempt to solve picoCTF 2022 Forensics challenges 4 to 9. Link to Part - 1 Let's get started! Challenge 4 - Packets Primer The description says to download the linked packet capture file and analyse it. Let's start by open...CTF
Ujjawal Sainiujjawalsaini.hashnode.dev·Sep 29, 2022PicoCTF 2022 Forensics walkthrough - Part 1In this article, we will attempt to solve picoCTF 2022 Forensics challenges 1 to 3. This post assumes you are familiar with what CTF is, if not then feel free to check out this introduction to CTF video by LiveOverFlow: So, let's get started. Chall...28 readsCTF