Here are the writeups I’ve done for old picoCTF puzzles.
Please try to solve these puzzles on your own before blindly following these writeups to get points.
| Puzzle Name | Category | Point Value | Tools Used |
|---|---|---|---|
| Obedient Cat | General Skills | 5 | cat |
| Mod 26 | Cryptography | 10 | CyberChef |
| Python Wrangling | General Skills | 10 | Python |
| Wave a flag | General Skills | 10 | strings, file |
| information | Forensics | 10 | exiftool, CyberChef |
| Nice netcat… | General Skills | 15 | CyberChef, netcat |
| Transformation | Reverse Engineering | 20 | Python, xxd, awk |
| Stonks | Binary Exploitation | 20 | netcat, CyberChef, shell scripting |
| GET aHEAD | Web Exploitation | 20 | curl |
| Mind your Ps and Qs | Cryptography | 20 | |
| Static ain’t always noise | General Skills | 20 | file, strings |
| Tab, Tab, Attack | General Skills | 20 | unzip, file, strings |
| keygenme-py | Reverse Engineering | 30 | Python |
| Matryoshka doll | Forensics | 30 | file, hex editor, binwalk, |
| crackme-py | Reverse Engineering | 30 | Python, CyberChef |
| Magikarp Ground Mission | General Skills | 30 | ssh, ls, cat |
| tunn3l v1s10n | Forensics | 40 | |
| Easy Peasy | Cryptography | 40 | |
| ARMssembly 0 | Reverse Engineering | 40 | |
| Cookies | Web Exploitation | 40 | EditThisCookie |
| vault-door-training | Reverse Engineering | 50 | |
| Insp3ct0r | Web Exploitation | 50 | |
| Lets Warm Up | General Skills | 50 | manual pages |
| Glory of the Garden | Forensics | 50 | |
| Warmed Up | General Skills | 50 | Python |
| The Numbers | Cryptography | 50 | |
| 2Warm | General Skills | 50 | math |
| Wireshark doo doooo do doo… | Forensics | 50 | |
| speeds and feeds | Reverse Engineering | 50 | Google, netcat, ncviewer.com |
| Shop | Reverse Engineering | 50 | Ghidra, netcat, CyberChef |
| Scavenger Hunt | Web Exploitation | 50 | |
| HacroHard WeakEdge | Forensics | 60 | oletools, shell scripting, base64 |
| New Caesar | Cryptography | 60 | |
| ARMssembly 1 | Reverse Engineering | 70 | |
| Cache Me Outside | Binary Exploitation | 70 | |
| Some Assembly Required 1 | Web Exploitation | 70 | |
| Mini RSA | Cryptography | 70 | |
| Dachshund Attacks | Cryptography | 80 | |
| Trivial Flag Transfer Protocol | Forensics | 90 | Wireshark, file, tar, cat, steghide, rot13.com |
| More Cookies | Web Exploitation | 90 | |
| ARMssembly 2 | Reverse Engineering | 90 | |
| No Padding, No Problem | Cryptography | 90 | |
| Here’s a LIBC | Binary Exploitation | 90 | |
| where are the robots | Web Exploitation | 100 | Web browser |
| vault-door-1 | Reverse Engineering | 100 | Shell scripting |
| what’s a net cat? | General Skills | 100 | netcat |
| strings it | General Skills | 100 | |
| Easy1 | Cryptography | 100 | |
| logon | Web Exploitation | 100 | |
| 13 | Cryptography | 100 | |
| caesar | Cryptography | 100 | |
| dont-use-client-side | Web Exploitation | 100 | |
| Bases | General Skills | 100 | CyberChef, base64 |
| First Grep | General Skills | 100 | grep, file |
| Pixelated | Cryptography | 100 | |
| It is my Birthday | Web Exploitation | 100 | |
| Wireshark twoo twooo two twoo… | Forensics | 100 | |
| Who are you? | Web Exploitation | 100 | |
| Hurry up! Wait! | Reverse Engineering | 100 | Ghidra |
| Unsubscriptions Are Free | Binary Exploitation | 100 | |
| login | Web Exploitation | 100 | |
| advanced-potion-making | Forensics | 100 | |
| spelling-quiz | Cryptography | 100 | |
| Disk, disk, sleuth! | Forensics | 110 | |
| Play Nice | Cryptography | 110 | |
| Some Assembly Required 2 | Web Exploitation | 110 | |
| gogo | Reverse Engineering | 110 | |
| Milkslap | Forensics | 120 | zsteg, exiftool, file |
| Double DES | Cryptography | 120 | |
| ARMssembly 3 | Reverse Engineering | 130 | |
| Compress and Attack | Cryptography | 130 | |
| Disk, disk, sleuth! II | Forensics | 130 | |
| Super Serial | Web Exploitation | 130 | |
| Scrambled: RSA | Cryptography | 140 | |
| So Meta | Forensics | 150 | exiftool |
| shark on wire 1 | Forensics | 150 | Wireshark |
| extensions | Forensics | 150 | file |
| What Lies Within | Forensics | 150 | zsteg |
| Let’s get dynamic | Reverse Engineering | 150 | |
| Most Cookies | Web Exploitation | 150 | |
| caas | Web Exploitation | 150 | |
| XtraORdinary | Cryptography | 150 | |
| triple-secure | Cryptography | 150 | |
| clutter-overflow | Binary Exploitation | 150 | |
| not crypto | Reverse Engineering | 150 | |
| Easy as GDB | Reverse Engineering | 160 | |
| Some Assembly Required 3 | Web Exploitation | 160 | |
| filtered-shellcode | Binary Exploitation | 160 | |
| Web Gauntlet 2 | Web Exploitation | 170 | |
| ARMssembly 4 | Reverse Engineering | 170 | |
| Powershelly | Reverse Engineering | 180 | |
| la cifra de | Cryptography | 200 | |
| picobrowser | Web Exploitation | 200 | |
| asm1 | Reverse Engineering | 200 | |
| Tapping | Cryptography | 200 | |
| Flags | Cryptography | 200 | |
| Based | General Skills | 200 | netcat, CyberChef |
| Mr-Worldwide | Cryptography | 200 | |
| plumbing | General Skills | 200 | netcat, grep |
| vault-door-3 | Reverse Engineering | 200 | |
| rsa-pop-quiz | Cryptography | 200 | |
| Client-side-again | Web Exploitation | 200 | |
| Pitter, Patter, Platters | Forensics | 200 | Active@ Disk Editor, file, mount |
| Web Gauntlet | Web Exploitation | 200 | |
| Kit Engine | Binary Exploitation | 200 | |
| Some Assembly Required 4 | Web Exploitation | 200 | |
| scrambled-bytes | Forensics | 200 | |
| breadth | Reverse Engineering | 200 | |
| WPA-ing Out | Forensics | 200 | |
| asm2 | Reverse Engineering | 250 | |
| m00nwalk | Forensics | 250 | |
| WhitePages | Forensics | 250 | emacs, Python, CyberChef |
| c0rrupt | Forensics | 250 | |
| vault-door-4 | Reverse Engineering | 250 | |
| like1000 | Forensics | 250 | tar, shell scripting |
| Guessing Game 1 | Binary Exploitation | 250 | |
| Surfing the Waves | Forensics | 250 | |
| Stonk Market | Binary Exploitation | 250 | |
| X marks the spot | Web Exploitation | 250 | |
| notepad | Web Exploitation | 250 | |
| college-rowing-team | Cryptography | 250 | |
| fermat-strings | Binary Exploitation | 250 | |
| droids0 | Reverse Engineering | 300 | |
| mus1c | General Skills | 300 | Rockstar, CyberChef |
| m00nwalk2 | Forensics | 300 | |
| waves over lambda | Cryptography | 300 | |
| messy-malloc | Binary Exploitation | 300 | |
| flag_shop | General Skills | 300 | Netcat, emacs |
| Investigative Reversing 0 | Forensics | 300 | |
| asm3 | Reverse Engineering | 300 | |
| miniRSA | Cryptography | 300 | |
| vault-door-5 | Reverse Engineering | 300 | |
| reverse_cipher | Reverse Engineering | 300 | |
| Irish-Name-Repo 1 | Web Exploitation | 300 | |
| shark on wire 2 | Forensics | 300 | strings, Wireshark, CyberChef, tcpdump, awk, sed |
| Guessing Game 2 | Binary Exploitation | 300 | |
| OTP Implementation | Reverse Engineering | 300 | |
| It’s Not My Fault 1 | Cryptography | 300 | |
| Web Gauntlet 3 | Web Exploitation | 300 | |
| Very very very Hidden | Forensics | 300 | Wireshark, file, Python, CyberChef |
| New Vignere | Crypgotraphy | 300 | |
| Rolling My Own | Reverse Engineering | 300 | |
| JAuth | Web Exploitation | 300 | |
| Investigative Reversing 2 | Forensics | 350 | |
| WebNet0 | Forensics | 350 | Wireshark |
| vault-door-6 | Reverse Engineering | 350 | |
| seed-sPRiNG | Binary Exploitation | 350 | |
| Irish-Name-Repo 2 | Web Exploitation | 350 | |
| 1_wanna_b3_a_r0ck5tar | General Skills | 350 | |
| Download Horsepower | Binary Exploitation | 350 | |
| corrupt-key-1 | Cryptography | 350 | |
| SaaS | Binary Exploitation | 350 | |
| riscy business | Reverse Engineering | 350 | |
| Checkpass | Reverse Engineering | 375 | |
| b00tl3gRSA2 | Cryptography | 400 | |
| asm4 | Reverse Engineering | 400 | |
| Irish-Name-Repo 3 | Web Exploitation | 400 | |
| JaWT Scratchpad | Web Exploitation | 400 | |
| Java Script Kiddie | Web Exploitation | 400 | |
| Need For Speed | Reverse Engineering | 400 | |
| Investigative Reversing 4 | Forensics | 400 | |
| B1ll_Gat35 | Reverse Engineering | 400 | |
| droids2 | Reverse Engineering | 400 | |
| vault-door-7 | Reverse Engineering | 400 | |
| AES-ABC | Cryptography | 400 | |
| Investigative Reversing 3 | Forensics | 400 | |
| The Office | Binary Exploitation | 400 | |
| homework | Binary Exploitation | 400 | |
| vault-door-8 | Reverse Engineering | 450 | |
| droids3 | Reverse Engineering | 450 | |
| Java Script Kiddie 2 | Web Exploitation | 450 | |
| WebNet1 | Forensics | 450 | Wireshark |
| investigation_encoded_1 | Forensics | 450 | |
| b00tl3gRSA3 | Cryptography | 450 | |
| Turoflan | Binary Exploitation | 450 | |
| lockdown-horses | Binary Exploitation | 450 | |
| john_pollard | Cryptography | 500 | |
| droids4 | Reverse Engineering | 500 | |
| Forky | Reverse Engineering | 500 | |
| investigation_encoded_2 | Forensics | 500 | |
| sice_cream | Binary Exploitation | 500 | |
| B1g_Mac | Forensics | 500 | |
| zero_to_hero | Binary Exploitation | 500 | |
| Clouds | Cryptography | 500 | |
| Bizz Fuzz | Binary Exploitation | 500 | |
| Bithug | Web Exploitation | 500 | |
| corrupt-key-2 | Cryptography | 500 | |
| vr-school | Binary Exploitation | 500 | |
| MATRIX | Reverse Engineering | 500 |