Skip to content

Commit

Permalink
Fix formating
Browse files Browse the repository at this point in the history
  • Loading branch information
Xabifk committed Nov 27, 2023
1 parent 6375cbb commit f504a18
Show file tree
Hide file tree
Showing 9 changed files with 16 additions and 1 deletion.
2 changes: 2 additions & 0 deletions src/caas.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,9 +6,11 @@ Download [index.js](https://artifacts.picoctf.net/picoMini+by+redpwn/Web+Exploit

<details>
<summary>Solution</summary>

When looking at index.js we can see that our message is included into an unsanitized commandline.
We can break out and execute anything we want by using a `;` then we can cat the flag `cat falg.txt`
Here the flag is called `falg.txt` for some reason.

Final payload: `alune;cat falg.txt`
Final flag: `picoCTF{moooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo0o}`
</details>
2 changes: 2 additions & 0 deletions src/caesar.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,8 +7,10 @@ caesar cipher [tutorial](https://learncryptography.com/classical-encryption/cae

<details>
<summary>Solution</summary>

Go to CyberChef and paste in the text between `{}
Add in the rule `ROT13` to the recipe and set the amount to `25`

Final flag: `picoCTF{crossingtherubiconzaqjsscr]`
</details>

2 changes: 2 additions & 0 deletions src/dont-use-client.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,9 @@ Never trust the client

<details>
<summary>Solution</summary>

View source on the challenge page. Notice the verify function. Construct the string that would pass that check.

Final flag: `picoCTF{no_clients_plz_1a3c89}`
</details>

2 changes: 2 additions & 0 deletions src/insp3ct0r.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,10 @@ There's 3 parts

<details>
<summary>Solution</summary>

Use inspect element, or view source to look in the source code of the page. We see a part of the flag as a comment
We can then do the same with `mycss.css` and `myjs.js` to get the other parts.

Final flag: `picoCTF{tru3_d3t3ct1ve_0r_ju5t_lucky?832b0699}`
</details>

3 changes: 3 additions & 0 deletions src/keygenme-py.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,9 +4,11 @@

<details>
<summary>Solution</summary>

Looking at the source we see a function called check_key. It does a bunch of checks to see if our input is a valid key.
Thankfully we have all the info necessary to recreate it, instead of comparing we can just print the correct value.
I just copy-pasted the original code and deleted some of the unnecessary parts.

Code:
```
import hashlib
Expand Down Expand Up @@ -49,5 +51,6 @@ def get_key(username_trial):
get_key(bUsername_trial)
```

Final flag: `picoCTF{1n_7h3_|<3y_of_e584b363}`
</details>
1 change: 1 addition & 0 deletions src/pixelated.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@ Think of different ways you can "stack" images

<details>
<summary>Solution</summary>

Use python PIL
If you play around with different operation for each pail of pixels you’ll notice that a lot of them turn white when using xor.
Make the non white ones obvious.
Expand Down
2 changes: 2 additions & 0 deletions src/substitution2.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,9 +6,11 @@ Try refining your frequency attack, maybe analyzing groups of letters would impr

<details>
<summary>Solution</summary>

You would usually solve something like this using statistical analysis for letters and groups of letters.
Knowing that the text is English we can assume that the most common letter is also the most common letter in English text.
Same goes for groups of letters. This would also be easier if we had spaces and punctuation.
If you promise you understand all that I'll let you use [quipqiup](https://quipqiup.com/) so it can do all that for you. (select statistics in the drop down)

Final flag: `picoCTF{N6R4M_4N41Y515_15_73D10U5_8E1BF808}`
</details>
2 changes: 2 additions & 0 deletions src/unpackme-py.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,9 @@ Can you get the flag?Reverse engineer this [Python program](https://artifacts.p

<details>
<summary>Solution</summary>

Replace the call to `exec` with `print`. When run the program will output the unpacked code containing the flag.

Final flag: `picoCTF{175_chr157m45_85f5d0ac}`
</details>

1 change: 0 additions & 1 deletion src/use-git-workflow.md

This file was deleted.

0 comments on commit f504a18

Please sign in to comment.