picoCTF Writeups

Here are the writeups I’ve done for old picoCTF puzzles.

Please try to solve these puzzles on your own before blindly following these writeups to get points.

Puzzle NameCategoryPoint ValueTools Used
Obedient CatGeneral Skills5cat
Mod 26Cryptography10CyberChef
Python WranglingGeneral Skills10Python
Wave a flagGeneral Skills10strings, file
informationForensics10exiftool, CyberChef
Nice netcat…General Skills15CyberChef, netcat
TransformationReverse Engineering20Python, xxd, awk
StonksBinary Exploitation20netcat, CyberChef, shell scripting
GET aHEADWeb Exploitation20curl
Mind your Ps and QsCryptography20
Static ain’t always noiseGeneral Skills20file, strings
Tab, Tab, AttackGeneral Skills20unzip, file, strings
keygenme-pyReverse Engineering30Python
Matryoshka dollForensics30file, hex editor, binwalk,
crackme-pyReverse Engineering30Python, CyberChef
Magikarp Ground MissionGeneral Skills30ssh, ls, cat
tunn3l v1s10nForensics40
Easy PeasyCryptography40
ARMssembly 0Reverse Engineering40
CookiesWeb Exploitation40EditThisCookie
vault-door-trainingReverse Engineering50
Insp3ct0rWeb Exploitation50
Lets Warm UpGeneral Skills50manual pages
Glory of the GardenForensics50
Warmed UpGeneral Skills50Python
The NumbersCryptography50
2WarmGeneral Skills50math
Wireshark doo doooo do doo…Forensics50
speeds and feedsReverse Engineering50Google, netcat, ncviewer.com
ShopReverse Engineering50Ghidra, netcat, CyberChef
Scavenger HuntWeb Exploitation50
HacroHard WeakEdgeForensics60oletools, shell scripting, base64
New CaesarCryptography60
ARMssembly 1Reverse Engineering70
Cache Me OutsideBinary Exploitation70
Some Assembly Required 1Web Exploitation70
Mini RSACryptography70
Dachshund AttacksCryptography80
Trivial Flag Transfer ProtocolForensics90Wireshark, file, tar, cat, steghide, rot13.com
More CookiesWeb Exploitation90
ARMssembly 2Reverse Engineering90
No Padding, No ProblemCryptography90
Here’s a LIBCBinary Exploitation90
where are the robotsWeb Exploitation100Web browser
vault-door-1Reverse Engineering100Shell scripting
what’s a net cat?General Skills100netcat
strings itGeneral Skills100
Easy1Cryptography100
logonWeb Exploitation100
13Cryptography100
caesarCryptography100
dont-use-client-sideWeb Exploitation100
BasesGeneral Skills100CyberChef, base64
First GrepGeneral Skills100grep, file
PixelatedCryptography100
It is my BirthdayWeb Exploitation100
Wireshark twoo twooo two twoo…Forensics100
Who are you?Web Exploitation100
Hurry up! Wait!Reverse Engineering100Ghidra
Unsubscriptions Are FreeBinary Exploitation100
loginWeb Exploitation100
advanced-potion-makingForensics100
spelling-quizCryptography100
Disk, disk, sleuth!Forensics110
Play NiceCryptography110
Some Assembly Required 2Web Exploitation110
gogoReverse Engineering110
MilkslapForensics120zsteg, exiftool, file
Double DESCryptography120
ARMssembly 3Reverse Engineering130
Compress and AttackCryptography130
Disk, disk, sleuth! IIForensics130
Super SerialWeb Exploitation130
Scrambled: RSACryptography140
So MetaForensics150exiftool
shark on wire 1Forensics150Wireshark
extensionsForensics150file
What Lies WithinForensics150zsteg
Let’s get dynamicReverse Engineering150
Most CookiesWeb Exploitation150
caasWeb Exploitation150
XtraORdinaryCryptography150
triple-secureCryptography150
clutter-overflowBinary Exploitation150
not cryptoReverse Engineering150
Easy as GDBReverse Engineering160
Some Assembly Required 3Web Exploitation160
filtered-shellcodeBinary Exploitation160
Web Gauntlet 2Web Exploitation170
ARMssembly 4Reverse Engineering170
PowershellyReverse Engineering180
la cifra deCryptography200
picobrowserWeb Exploitation200
asm1Reverse Engineering200
TappingCryptography200
FlagsCryptography200
BasedGeneral Skills200netcat, CyberChef
Mr-WorldwideCryptography200
plumbingGeneral Skills200netcat, grep
vault-door-3Reverse Engineering200
rsa-pop-quizCryptography200
Client-side-againWeb Exploitation200
Pitter, Patter, PlattersForensics200Active@ Disk Editor, file, mount
Web GauntletWeb Exploitation200
Kit EngineBinary Exploitation200
Some Assembly Required 4Web Exploitation200
scrambled-bytesForensics200
breadthReverse Engineering200
WPA-ing OutForensics200
asm2Reverse Engineering250
m00nwalkForensics250
WhitePagesForensics250emacs, Python, CyberChef
c0rruptForensics250
vault-door-4Reverse Engineering250
like1000Forensics250tar, shell scripting
Guessing Game 1Binary Exploitation250
Surfing the WavesForensics250
Stonk MarketBinary Exploitation250
X marks the spotWeb Exploitation250
notepadWeb Exploitation250
college-rowing-teamCryptography250
fermat-stringsBinary Exploitation250
droids0Reverse Engineering300
mus1cGeneral Skills300Rockstar, CyberChef
m00nwalk2Forensics300
waves over lambdaCryptography300
messy-mallocBinary Exploitation300
flag_shopGeneral Skills300Netcat, emacs
Investigative Reversing 0Forensics300
asm3Reverse Engineering300
miniRSACryptography300
vault-door-5Reverse Engineering300
reverse_cipherReverse Engineering300
Irish-Name-Repo 1Web Exploitation300
shark on wire 2Forensics300strings, Wireshark, CyberChef, tcpdump, awk, sed
Guessing Game 2Binary Exploitation300
OTP ImplementationReverse Engineering300
It’s Not My Fault 1Cryptography300
Web Gauntlet 3Web Exploitation300
Very very very HiddenForensics300Wireshark, file, Python, CyberChef
New VignereCrypgotraphy300
Rolling My OwnReverse Engineering300
JAuthWeb Exploitation300
Investigative Reversing 2Forensics350
WebNet0Forensics350Wireshark
vault-door-6Reverse Engineering350
seed-sPRiNGBinary Exploitation350
Irish-Name-Repo 2Web Exploitation350
1_wanna_b3_a_r0ck5tarGeneral Skills350
Download HorsepowerBinary Exploitation350
corrupt-key-1Cryptography350
SaaSBinary Exploitation350
riscy businessReverse Engineering350
CheckpassReverse Engineering375
b00tl3gRSA2Cryptography400
asm4Reverse Engineering400
Irish-Name-Repo 3Web Exploitation400
JaWT ScratchpadWeb Exploitation400
Java Script KiddieWeb Exploitation400
Need For SpeedReverse Engineering400
Investigative Reversing 4Forensics400
B1ll_Gat35Reverse Engineering400
droids2Reverse Engineering400
vault-door-7Reverse Engineering400
AES-ABCCryptography400
Investigative Reversing 3Forensics400
The OfficeBinary Exploitation400
homeworkBinary Exploitation400
vault-door-8Reverse Engineering450
droids3Reverse Engineering450
Java Script Kiddie 2Web Exploitation450
WebNet1Forensics450Wireshark
investigation_encoded_1Forensics450
b00tl3gRSA3Cryptography450
TuroflanBinary Exploitation450
lockdown-horsesBinary Exploitation450
john_pollardCryptography500
droids4Reverse Engineering500
ForkyReverse Engineering500
investigation_encoded_2Forensics500
sice_creamBinary Exploitation500
B1g_MacForensics500
zero_to_heroBinary Exploitation500
CloudsCryptography500
Bizz FuzzBinary Exploitation500
BithugWeb Exploitation500
corrupt-key-2Cryptography500
vr-schoolBinary Exploitation500
MATRIXReverse Engineering500

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s