- picoCTF-2019 56
- CTFlearn 39
- picoCTF-2018 26
- picoCTF-2021 21
- CRYPTOHACK 10
- Root Me 9
- CyberForce 8
- RingZer0-CTF 4
- picoMini by redpwn 1
picoCTF-2019
shark on wire 2
Problem: We found this packet capture. Recover the flag that was pilfered from the network. You can also find the file in /problems/shark-on-wire-2_0_3e92bfbdb2f6d0e25b8d019453fdbf07.
practice-run-1
Problem: You’re going to need to know how to run programs if you’re going to get out of here. Navigate to /problems/practice-run-1_0_62b61488e896645ebff9b6c97d0e775e on the shell server and run this program to receive a flag.
like1000
Problem: This .tar file got tarred alot. Also available at /problems/like1000_0_369bbdba2af17750ddf10cc415672f1c.
JaWT Scratchpad
Problem: Check the admin scratchpad! https://2019shell1.picoctf.com/problem/21893/ or http://2019shell1.picoctf.com:21893
WhitePages
Problem: I stopped using YellowPages and moved onto WhitePages… but the page they gave me is all blank!
c0rrupt
Problem: We found this file. Recover the flag. You can also find the file in /problems/c0rrupt_0_1fcad1344c25a122a00721e4af86de13.
where are the robots
Problem: Can you find the robots? https://2019shell1.picoctf.com/problem/45102/ (link) or http://2019shell1.picoctf.com:45102
What Lies Within
Problem: Theres something in the building. Can you retrieve the flag?
unzip
Problem: Can you unzip this file and get the flag?
So Meta
Problem: Find the flag in this picture. You can also find the file in /problems/so-meta_1_ab9d99603935344b81d7f07973e70155.
shark on wire 1
Problem: We found this packet capture. Recover the flag. You can also find the file in /problems/shark-on-wire-1_0_13d709ec13952807e477ba1b5404e620.
picobrowser
Problem: This website can be rendered only by picobrowser, go and catch the flag! https://2019shell1.picoctf.com/problem/21851/ (link) or http://2019shell1.picoctf.com:21851
Open-to-admins
Problem: This secure website allows users to access the flag only if they are admin and if the time is exactly 1400. https://2019shell1.picoctf.com/problem/47265/ (link) or http://2019shell1.picoctf.com:47265
logon
Problem: The factory is hiding things from all of its users. Can you login as logon and find what they’ve been looking at? https://2019shell1.picoctf.com/problem/47307/ (link) or http://2019shell1.picoctf.com:47307
extensions
Problem: This is a really weird text file TXT? Can you find the flag?
dont-use-client-side
Problem: Can you break into this super secure portal? https://2019shell1.picoctf.com/problem/45147/ (link) or http://2019shell1.picoctf.com:45147
Client-side-again
Problem: Can you break into this super secure portal? https://2019shell1.picoctf.com/problem/21886/ (link) or http://2019shell1.picoctf.com:21886
waves over lambda
Problem: We made alot of substitutions to encrypt this. Can you decrypt it? Connect with nc 2019shell1.picoctf.com 45185
.
vault-door-training
Problem: Your mission is to enter Dr. Evil’s laboratory and retrieve the blueprints for his Doomsday Project. The laboratory is protected by a series of locked vault doors. Each door is controlled by a computer and requires a password to open. Unfortunately, our undercover agents have not been able to obtain the secret passwords for the vault doors, but one of our junior agents obtained the source code for each vault’s computer! You will need to read the source code for each level to figure out what the password is for that vault door. As a warmup, we have created a replica vault in our training facility. The source code for the training vault is here: VaultDoorTraining.java
vault-door-8
Problem: Apparently Dr. Evil’s minions knew that our agency was making copies of their source code, because they intentionally sabotaged this source code in order to make it harder for our agents to analyze and crack into! The result is a quite mess, but I trust that my best special agent will find a way to solve it. The source code for this vault is here: VaultDoor8.java
vault-door-7
Problem: This vault uses bit shifts to convert a password string into an array of integers. Hurry, agent, we are running out of time to stop Dr. Evil’s nefarious plans! The source code for this vault is here: VaultDoor7.java
vault-door-6
Problem: This vault uses an XOR encryption scheme. The source code for this vault is here: VaultDoor6.java
vault-door-5
Problem: In the last challenge, you mastered octal (base 8), decimal (base 10), and hexadecimal (base 16) numbers, but this vault door uses a different change of base as well as URL encoding! The source code for this vault is here: VaultDoor5.java
vault-door-4
Problem: This vault uses ASCII encoding for the password. The source code for this vault is here: VaultDoor4.java
vault-door-3
Problem: This vault uses for-loops and byte arrays. The source code for this vault is here: VaultDoor3.java
vault-door-1
Problem: This vault uses some complicated arrays! I hope you can make sense of it, special agent. The source code for this vault is here: VaultDoor1.java
Tapping
Problem: Theres tapping coming in from the wires. What’s it saying nc 2019shell1.picoctf.com 12285.
rsa-pop-quiz
Problem: Class, take your seats! It’s PRIME-time for a quiz… nc 2019shell1.picoctf.com 48028
Mr-Worldwide
Problem: A musician left us a message. What’s it mean?
miniRSA
Problem: Lets decrypt this: ciphertext? Something seems a bit small
la cifra de
Problem: I found this cipher in an old book. Can you figure out what it says? Connect with nc 2019shell1.picoctf.com 32203.
Flags
Problem: What do the flags mean?
Easy1
Problem: The one time pad can be cryptographically secure, but not when you know the key. Can you solve this? We’ve given you the encrypted flag, key, and a table to help UFJKXQZQUNB with the key of SOLVECRYPTO. Can you use this table to solve it?.
caesar
Problem: Decrypt this message. You can find the ciphertext in /problems/caesar_1_4c9d445f770c71bd84ab0d822197a005 on the shell server.
b00tl3gRSA2
Problem: In RSA d is alot bigger than e, why dont we use d to encrypt instead of e? Connect with nc 2019shell1.picoctf.com 25894
.
asm1
Problem: What does asm1(0x610) return? Submit the flag as a hexadecimal value (starting with ‘0x’). NOTE: Your submission for this question will NOT be in the normal flag format. Source located in the directory at /problems/asm1_1_95494d904d73b330976420bc1cd763ec.
13
Problem: Cryptography can be easy, do you know what ROT13 is? cvpbPGS{abg_gbb_onq_bs_n_ceboyrz}
where-is-the-file
Problem: I’ve used a super secret mind trick to hide this file. Maybe something lies in /problems/where-is-the-file_6_8eae99761e71a8a21d3b82ac6cf2a7d0.
whats-the-difference
Problem: Can you spot the difference? kitters cattos. They are also available at /problems/whats-the-difference_0_00862749a2aeb45993f36cc9cf98a47a on the shell server
what’s a net cat?
Problem: Using netcat (nc) is going to be pretty important. Can you connect to 2019shell1.picoctf.com
at port 47229
to get the flag?
Warmed Up
Problem: What is 0x3D (base 16) in decimal (base 10).
The Numbers
Problem: The numbers… what do they mean?
strings it
Problem: Can you find the flag in file without running it? You can also find the file in /problems/strings-it_3_8386a6aa560aecfba03c0c6a550b5c51 on the shell server.
Resources
Problem: We put together a bunch of resources to help you out on our website! If you go over there, you might even find a flag! https://picoctf.com/resources (link)
plumbing
Problem: Sometimes you need to handle process data outside of a file. Can you find a way to keep the output from this program and search for the flag? Connect to 2019shell1.picoctf.com 13203.
mus1c
Problem: I wrote you a song. Put it in the picoCTF{} flag format
Lets Warm Up
Problem: If I told you a word started with 0x70 in hexadecimal, what would it start with in ASCII?
Insp3ct0r
Problem: Kishor Balan tipped us off that the following code may need inspection: https://2019shell1.picoctf.com/problem/28717/ (link) or http://2019shell1.picoctf.com:28717
Glory of the Garden
Problem: This garden contains more than it seems. You can also find the file in /problems/glory-of-the-garden_0_25ece79ae00914856938a4b19d0e31af on the shell server.
flag_shop
Problem: There’s a flag shop selling stuff, can you buy a flag? Source. Connect with nc 2019shell1.picoctf.com 3967.
First Grep
Problem: Can you find the flag in file? This would be really tedious to look through manually, something tells me there is a better way. You can also find the file in /problems/first-grep_5_452e1c1630eb14b6753e9a155c3ae588 on the shell server.
First Grep: Part II
Problem: Can you find the flag in /problems/first-grep–part-ii_6_84224d7d745e41d24bde7e7bc7062bbe/files on the shell server? Remember to use grep.
Bases
Problem: What does this bDNhcm5fdGgzX3IwcDM1 mean? I think it has something to do with bases.
Based
Problem: To get truly 1337, you must understand different data encodings, such as hexadecimal or binary. Can you get the flag from this program to prove you are on the way to becoming 1337? Connect with nc 2019shell1.picoctf.com 44303.
2Warm
Problem: Can you convert the number 42 (base 10) to binary (base 2)?
1_wanna_b3_a_r0ck5tar
Problem: I wrote you another song. Put the flag in the picoCTF{} flag format
CTFlearn
Wikipedia
Not much to go off here, but it’s all you need: Wikipedia and 128.125.52.138.
Where Can My Robot Go?
Where do robots find what pages are on a website?
Tux!
The flag is hidden inside the Penguin! Solve this challenge before solving my 100 point Scope challenge which uses similar techniques as this one.
Time Traveller
Let’s take a trip to nasa.gov on December 31, 1996. If you can tell me what email NASA listed on their website, I’ll provide you with 10 points. Format: CTFlearn{email}
Snowboard
Find the flag in the jpeg file. Good Luck!
Simple Steganography
Think the flag is somewhere in there. Would you help me find it? hint-“ Steghide Might be Helpfull”
Rubber Duck
Find the flag! Simple forensics challenge to get started with.
QR Code
Do you remember something known as QR Code? Simple. Here for you : https://mega.nz/#!eGYlFa5Z!8mbiqg3kosk93qJCP-DBxIilHH2rf7iIVY-kpwyrx-0
Practice Flag
This is what a challenge on CTFlearn looks like. Each challenge has a flag, which is the key to solving it.
PikesPeak
Pay attention to those strings!
Pho Is Tasty!
The flag is hidden in the jpeg file. Good Luck! Have some Pho! Solve this challenge before solving my Scope challenge for 100 points.
File: THE_FILE
Solution:
Tried exiftool, strings, binwalk
bless Pho.jpg
43 04 15 54 02 06 46 14 0D 6C 16 0E 65 06 19 61 17 1F 72 1B 18 6E 01 0C 7B 04 07 49 0F 03 5F 02 0E 4C 16 18 6F 1F 04 76 19 0C 65 1F 06 5F 18 01 50 11 10 68 13 14 6F 1A 02 21 04 02 21 13 14 21 0B 14 7D
or
CTF
learn{I_Love_Pho!!!}
Remove everything but the letters.
Flag: CTFlearn{I_Love_Pho!!!}
PDF by fdpumyp
Hi, just as we talked during a break, you have this file here and check if something is wrong with it. That’s the only thing we found strange with this suspect, I hope there will be a password for his external drive
Minions
Hey! Minions have stolen my flag, encoded it few times in one cipher, and then hidden it somewhere there: https://mega.nz/file/1UBViYgD#kjKISs9pUB4E-1d79166FeX3TiY5VQcHJ_GrcMbaLhg Can you help me? TIP: Decode the flag until you got a sentence.
I’m a dump
The keyword is hexadecimal, and removing an useless H.E.H.U.H.E. from the flag. The flag is in the format CTFlearn{*}
Git Is Good
The flag used to be there. But then I redacted it. Good Luck. https://mega.nz/#!3CwDFZpJ!Jjr55hfJQJ5-jspnyrnVtqBkMHGJrd6Nn_QqM7iXEuc
GandalfTheWise
Extract the flag from the Gandalf.jpg file. You may need to write a quick script to solve this.
Exif
If only the password were in the image?
Chalkboard
Solve the equations embedded in the jpeg to find the flag. Solve this problem before solving my Scope challenge which is worth 100 points.
Blank Page
I’ve just graduated the Super Agent School. This is my first day as a spy. The Master-Mind sent me the secret message, but I don’t remember how to read this. Help!
abandoned place
the flag is outside of the pic, try to find it. another hint: dimensions, dimensions, everything is in dimensions.
Vigenere Cipher
The vignere cipher is a method of encrypting alphabetic text by using a series of interwoven Caesar ciphers based on the letters of a keyword.
Suspecious message
Hello! My friend Fari send me this suspecious message: ‘MQDzqdor{Ix4Oa41W_1F_B00h_m1YlqPpPP}’ and photo.png. Help me decrypt this!
Reverse Polarity
I got a new hard drive just to hold my flag, but I’m afraid that it rotted. What do I do? The only thing I could get off of it was this: 01000011010101000100011001111011010000100110100101110100010111110100011001101100011010010111000001110000011010010110111001111101
Morse Code
..-. .-.. .- –. … .- – ..- . .-.. – — .-. … . .. … -.-. — — .-.. -… -.– - …. . .– .- -.– .. .-.. .. -.- . -.-. …. . . …
Modern Gaius Julius Caesar
One of the easiest and earliest known ciphers but with XXI century twist! Nobody uses Alphabet nowadays right? Why should you when you have your keyboard?
HyperStream Test #2
I love the smell of bacon in the morning! ABAAAABABAABBABBAABBAABAAAAAABAAAAAAAABAABBABABBAAAAABBABBABABBAABAABABABBAABBABBAABB
Hextroadinary
Meet ROXy, a coder obsessed with being exclusively the worlds best hacker. She specializes in short cryptic hard to decipher secret codes. The below hex values for example, she did something with them to generate a secret code, can you figure out what? Your answer should start with 0x.
Character Encoding
In the computing industry, standards are established to facilitate information interchanges among American coders. Unfortunately, I’ve made communication a little bit more difficult. Can you figure this one out? 41 42 43 54 46 7B 34 35 43 31 31 5F 31 35 5F 55 35 33 46 55 4C 7D
BruXOR
There is a technique called bruteforce. Message: q{vpln’bH_varHuebcrqxetrHOXEj No key! Just brute .. brute .. brute … :D
Base 2 2 the 6
There are so many different ways of encoding and decoding information nowadays… One of them will work! Q1RGe0ZsYWdneVdhZ2d5UmFnZ3l9
WOW…. So Meta
This photo was taken by our target. See what you can find out about him from it. https://mega.nz/#!ifA2QAwQ!WF-S-MtWHugj8lx1QanGG7V91R-S1ng7dDRSV25iFbk
Taking LS
Just take the Ls. Check out this zip file and I be the flag will remain hidden. https://mega.nz/#!mCgBjZgB!_FtmAm8s_mpsHr7KWv8GYUzhbThNn0I8cHMBi4fJQp8
Forensics 101
Think the flag is somewhere in there. Would you help me find it? https://mega.nz/#!OHohCbTa!wbg60PARf4u6E6juuvK9-aDRe_bgEL937VO01EImM7c
Binwalk
Here is a file with another file hidden inside it. Can you extract it? https://mega.nz/#!qbpUTYiK!-deNdQJxsQS8bTSMxeUOtpEclCI-zpK7tbJiKV0tXYY
POST Practice
This website requires authentication, via POST. However, it seems as if someone has defaced our site. Maybe there is still some way to authenticate? http://165.227.106.113/post.php
My Blog
Hi, I’m Noxtal! I have hidden a flag somewhere in my Cyberworld (AKA blog)… you may find a good application for your memory. ;)
Gobustme 👻
Some ghosts made this site 👻, it’s a little spooky but theres a bunch of stuff hidden around.
Don’t Bump Your Head(er)
Try to bypass my security measure on this site! http://165.227.106.113/header.php
Basic Injection
See if you can leak the whole database using what you know about SQL Injections. link
picoCTF-2018
Reversing Warmup 1
Problem: Throughout your journey you will have to run many programs. Can you navigate to /problems/reversing-warmup-1_0_f99f89de33522c93964bdec49fb2b838 on the shell server and run this program to retreive the flag?
assembly-0
Problem: What does asm0(0xaa,0xf2)
return? Submit the flag as a hexadecimal value (starting with ‘0x’). NOTE: Your submission for this question will NOT be in the normal flag format. Source located in the directory at /problems/assembly-0_2_485b2d48345b19addbeb06a36aabdc74
.
you can’t see me
Problem: ‘…reading transmission… Y.O.U. .C.A.N.’.T. .S.E.E. .M.E. …transmission ended…’ Maybe something lies in /problems/you-can-t-see-me_4_8bd1412e56df49a3c3757ebeb7ead77f.
Aca-Shell-A
Problem: It’s never a bad idea to brush up on those linux skills or even learn some new ones before you set off on this adventure! Connect with nc 2018shell.picoctf.com 58422
.
what base is this?
Problem: To be successful on your mission, you must be able read data represented in different ways, such as hexadecimal or binary. Can you get the flag from this program to prove you are ready? Connect with nc 2018shell.picoctf.com 1225
.
strings
Problem: Can you find the flag in this file without actually running it? You can also find the file in /problems/strings_2_b7404a3aee308619cb2ba79677989960 on the shell server.
Reversing Warmup 2
Problem: Can you decode the following string dGg0dF93NHNfczFtcEwz
from base64 format to ASCII?
pipe
Problem: During your adventure, you will likely encounter a situation where you need to process data that you receive over the network rather than through a file. Can you find a way to save the output from this program and search for the flag? Connect with 2018shell.picoctf.com 2015
.
No Login
Problem: Looks like someone started making a website but never got around to making a login, but I heard there was a flag if you were the admin. http://2018shell.picoctf.com:52920 (link)
net cat
Problem: Using netcat (nc) will be a necessity throughout your adventure. Can you connect to 2018shell.picoctf.com
at port 49387
to get the flag?
Logon
Problem: I made a website so now you can log on to! I don’t seem to have the admin password. See if you can’t get to the flag. http://2018shell.picoctf.com:5477 (link)
hertz
Problem: Here’s another simple cipher for you where we made a bunch of substitutions. Can you decrypt it? Connect with nc 2018shell.picoctf.com 43324
.
grep 2
Problem: This one is a little bit harder. Can you find the flag in /problems/grep-2_3_826f886f547acb8a9c3fccb030e8168d/files on the shell server? Remember, grep is your friend.
grep 1
Problem: Can you find the flag in file? This would be really obnoxious to look through by hand, see if you can find a faster way. You can also find the file in /problems/grep-1_4_0431431e36a950543a85426d0299343e on the shell server.
Client Side is Still Bad
Problem: I forgot my password again, but this time there doesn’t seem to be a reset, can you help me? http://2018shell.picoctf.com:8420 (link)
caesar cipher 1
Problem: This is one of the older ciphers in the books, can you decrypt the message? You can find the ciphertext in /problems/caesar-cipher-1_2_73ab1c3e92ea50396ad143ca48039b86 on the shell server.
Resources
Problem: We put together a bunch of resources to help you out on our website! If you go over there, you might even find a flag! https://picoctf.com/resources (link)
Mr. Robots
Problem: Do you see the same things I see? The glimpses of the flag hidden away? http://2018shell.picoctf.com:10157 (link)
Inspect Me
Problem: Inpect this code! http://2018shell.picoctf.com:53213 (link)
General Warmup 3
Problem: What is 0x3D (base 16) in decimal (base 10).
General Warmup 2
Problem: Can you convert the number 27 (base 10) to binary (base 2)?
General Warmup 1
Problem: If I told you your grade was 0x41 in hexadecimal, what would it be in ASCII?
Forensics Warmup 2
Problem: Hmm for some reason I can’t open this PNG? Any ideas?
Crypto Warmup 2
Problem: Cryptography doesn’t have to be complicated, have you ever heard of something called rot13? cvpbPGS{guvf_vf_pelcgb!}
Crypto Warmup 1
Problem: Crpyto can often be done by hand, here’s a message you got from a friend, llkjmlmpadkkc
with the key of thisisalilkey
. Can you use this table to solve it?.
Forensics Warmup 1
Problem: Can you unzip this file for me and retreive the flag?
picoCTF-2021
It is my Birthday
Problem: I sent out 2 invitations to all of my friends for my birthday! I’ll know if they get stolen because the two invites look similar, and they even have the same md5 hash, but they are slightly different! You wouldn’t believe how long it took me to find a collision. Anyway, see if you’re invited by submitting 2 PDFs to my website. http://mercury.picoctf.net:63578/
GET aHEAD
Problem: Find the flag being held on this server to get ahead of the competition http://mercury.picoctf.net:45028/
Wireshark twoo twooo two twoo…
Problem: Can you find the flag? shark2.pcapng.
Wireshark doo dooo do doo…
Problem: Can you find the flag? shark1.pcapng.
Trivial Flag Transfer Protocol
Problem: Figure out how they moved the flag.
Milkslap
Problem: 🥛 (http://mercury.picoctf.net:48380/)
Who are you?
Problem: Let me in. Let me iiiiiiinnnnnnnnnnnnnnnnnnnn http://mercury.picoctf.net:36622/
Some Assembly Required 1
Problem: http://mercury.picoctf.net:37669/index.html
Scavenger Hunt
Problem: There is some interesting information hidden around this site http://mercury.picoctf.net:5080/. Can you find it?
Matryoshka doll
Problem: Matryoshka dolls are a set of wooden dolls of decreasing size placed one inside another. What’s the final one? Image: this
information
Problem: Files can always be changed in a secret way. Can you find the flag? cat.jpg
Cookies
Problem: Who doesn’t love cookies? Try to figure out the best one. http://mercury.picoctf.net:54219/
Wave a flag
Problem: Can you invoke help flags for a tool or binary? This program has extraordinarily helpful information…
Tab, Tab, Attack
Problem: Using tabcomplete in the Terminal will add years to your life, esp. when dealing with long rambling directory structures and filenames: Addadshashanammu.zip
Static ain’t always noise
Problem: Can you look at the data in this binary: static? This BASH script might help!
Python Wrangling
Problem: Python scripts are invoked kind of like programs in the Terminal… Can you run this Python script using this password to get the flag?
Obedient Cat
Problem: This file has a flag in plain sight (aka “in-the-clear”). Download flag.
Nice netcat…
Problem: There is a nice program that you can talk to by using this command in a shell: $ nc mercury.picoctf.net 7449
, but it doesn’t speak English…
Mod 26
Problem: Cryptography can be easy, do you know what ROT13 is? cvpbPGS{arkg_gvzr_V'yy_gel_2_ebhaqf_bs_ebg13_jdJBFOXJ}
Magikarp Ground Mission
Problem: Do you know how to move between directories and read files in the shell? Start the container, ssh
to it, and then ls
once connected to begin. Login via ssh
as ctf-player
with the password, ee388b88
Easy Peasy
Problem: A one-time pad is unbreakable, but can you manage to recover the flag? (Wrap with picoCTF{}) nc mercury.picoctf.net 41934
otp.py
CRYPTOHACK
XOR Starter
XOR is a bitwise operator which returns 0 if the bits are the same, and 1 otherwise. In textbooks the XOR operator is denoted by ⊕, but in most challenges and programming languages you will see the caret ^ used instead.
XOR Properties
In the last challenge, you saw how XOR worked at the level of bits. In this one, we’re going to cover the properties of the XOR operation and then use them to undo a chain of operations that have encrypted a flag. Gaining an intuition for how this works will help greatly when you come to attacking real cryptosystems later, especially in the block ciphers category.
Network Attacks
Several of the challenges are dynamic and require you to talk to our challenge servers over the network. This allows you to perform man-in-the-middle attacks on people trying to communicate, or directly attack a vulnerable service. To keep things consistent, our interactive servers always send and receive JSON objects.
Hex
When we encrypt something the resulting ciphertext commonly has bytes which are not printable ASCII characters. If we want to share our encrypted data, it’s common to encode it into something more user-friendly and portable across different systems.
Great Snakes
Modern cryptography involves code, and code involves coding. CryptoHack provides a good opportunity to sharpen your skills.
Finding Flags
Each challenge is designed to help introduce you to a new piece of cryptography. Solving a challenge will require you to find a “flag”.
Encoding Challenge
Now you’ve got the hang of the various encodings you’ll be encountering, let’s have a look at automating it.
Bytes and Big Integers
Cryptosystems like RSA works on numbers, but messages are made up of characters. How should we convert our messages into numbers so that mathematical operations can be applied?
Base64
Another common encoding scheme is Base64, which allows us to represent binary data as an ASCII string using 64 characters. One character of a Base64 string encodes 6 bits, and so 4 characters of Base64 encodes three 8-bit bytes.
ASCII
ASCII is a 7-bit encoding standard which allows the representation of text using the integers 0-127.
Root Me
Javascript - Webpack
Statement: Find the password.
Javascript - Source
Statement: None
Javascript - Obfuscation 3
Statement: None.
Javascript - Obfuscation 2
Statement: None.
Javascript - Obfuscation 1
Statement: None.
Javascript - Native code
Statement: “No clue.”
Javascript - Authentication
Statement: None
Javascript - Authentication 2
Statement: None
HTML - disabled buttons
Statement: This form is disabled and can not be used. It’s up to you to find a way to use it.
CyberForce
CyberForce 2021 - Securely Provision
Securely Provision
One of the categories in the Department of Energy’s CyberForce Program - Conquer the Hill: Adventurer Edition 2021
CyberForce 2021 - Protect and Defend
Protect and Defend
One of the categories in the Department of Energy’s CyberForce Program - Conquer the Hill: Adventurer Edition 2021
CyberForce 2021 - Oversee and Govern
Oversee and Govern
One of the categories in the Department of Energy’s CyberForce Program - Conquer the Hill: Adventurer Edition 2021
CyberForce 2021 - Operate and Maintain
Operate and Maintain
One of the categories in the Department of Energy’s CyberForce Program - Conquer the Hill: Adventurer Edition 2021. I was busy and didn’t have the time to focus on this category.
CyberForce 2021 - Investigate
Investigate
One of the categories in the Department of Energy’s CyberForce Program - Conquer the Hill: Adventurer Edition 2021
CyberForce 2021 - Writeup
Department of Energy’s CyberForce Program - Conquer the Hill: Adventurer Edition 2021 Official Link
CyberForce 2021 - Collect and Operate
Collect and Operate
One of the categories in the Department of Energy’s CyberForce Program - Conquer the Hill: Adventurer Edition 2021
CyberForce 2021 - Analyze
Analyze
One of the categories in the Department of Energy’s CyberForce Program - Conquer the Hill: Adventurer Edition 2021
RingZer0-CTF
Why not?
Solution:
Then obfuscation is more secure?
Solution:
Is hashing more secure?
Solution:
Client side validation is so secure?
Solution:
picoMini by redpwn
login
Problem: My dog-sitter’s brother made this website but I can’t get in; can you help?