目录
-
-
- The Numbers
- caesar
- Easy1
- 13
- 2Warm
- Lets Warm Up
- Warmed Up
- Bases
- plumbing
- flag_shop
- Glory of the Garden
- Insp3ct0r
- dont-use-client-side
- So Meta
- extensions
- Flags
- Tapping
- la cifra de
- what's a net cat?
- WhitePages
- What Lies Within
- WebNet1
- WebNet0
- where are the robots
- vault-door-1
- b00tl3gRSA2
- miniRSA
- Irish-Name-Repo 1
- Irish-Name-Repo 2
- Irish-Name-Repo 3
- waves over lambda
- b00tl3gRSA3
- Client-side-again
- Open-to-admins
- picobrowser
- logon
- rsa-pop-quiz
-
The Numbers
Description:The numbers… what do they mean?
Hints:The flag is in the format PICOCTF{}
a-1 b-2 c-3 d-4 e-5 f-6 g-7 h-8
i-9 j-10 k-11 l-12 m-13 n-14 o-15 p-16
q-17 r-18 s-19 t-20 u-21 v-22 w-23 x-24
y-25 z-26
大括号前数字对应的字母是PICOCTF
GET FLAG!
PICOCTF{
THENUMBERSMASON}
caesar
Description:Decrypt this message
Hints:caesar cipher tutorial
picoCTF{
gvswwmrkxlivyfmgsrhnrisegl}
凯撒加密在线解密网站
GET FLAG!
picoCTF{
crossingtherubicondjneoach}
Easy1
Description:The one time pad can be cryptographically secure, but not when you know the key. Can you solve this? We’ve given you the encrypted flag, key, and
a table to help UFJKXQZQUNB with the key of SOLVECRYPTO
. Can you use this table to solve it?
Hints:
1.Submit your answer in our flag format. For example, if your answer was ‘hello’, you would submit ‘picoCTF{HELLO}’ as the flag.
2.Please use all caps for the message.
一看附件我们就知道这是考察维吉尼亚密码
维吉尼亚加密在线解密网站
GET FLAG!
picoCTF{
CRYPTOISFUN}
13
Description:Cryptography can be easy, do you know what ROT13 is?
cvpbPGS{abg_gbb_onq_bs_n_ceboyrz}
Hints:This can be solved online if you don’t want to do it by hand!
ROT13在线解密网站
GET FLAG!
picoCTF{
not_too_bad_of_a_problem}
2Warm
Description:Can you convert the number 42 (base 10) to binary (base 2)?
Hints:Submit your answer in our competition’s flag format. For example, if your answer was ‘11111’, you would submit ‘picoCTF{11111}’ as the flag
直接将十进制转化为二进制
GET FLAG!
picoCTF{
101010}
Lets Warm Up
Description:If I told you a word started with 0x70 in hexadecimal, what would it start with in ASCII?
Hints:Submit your answer in our flag format. For example, if your answer was ‘hello’, you would submit ‘picoCTF{hello}’ as the flag
0x70为十六进制70,转化为ASCII码为字母p
GET FLAG!
picoCTF{
p}
Warmed Up
Description:What is 0x3D (base 16) in decimal (base 10)?
Hints:Submit your answer in our flag format. For example, if your answer was ‘22’, you would submit ‘picoCTF{22}’ as the flag
GET FLAG!
picoCTF{
61}
Bases
Description:What does this
bDNhcm5fdGgzX3IwcDM1
mean? I think it has something to do with bases
Hints:Submit your answer in our flag format. For example, if your answer was ‘hello’, you would submit ‘picoCTF{hello}’ as the flag
GET FLAG!
picoCTF{
l3arn_th3_r0p35}
plumbing
Description:Sometimes you need to handle process data outside of a file. Can you find a way to keep the output from this program and search for the flag? Connect to jupiter.challenges.picoctf.org 22058
Hints:
1.Remember the flag format is picoCTF{XXXX}
2.What’s a pipe? No not that kind of pipe… This kind
nc jupiter.challenges.picoctf.org 22058 | grep pico
GET FLAG!
picoCTF{
digital_plumb3r_5ea1fbd7}
flag_shop
Description:There’s a flag shop selling stuff, can you buy a flag?
Source. Connect with nc jupiter.challenges.picoctf.org 60804
Hints:Two’s compliment can do some weird things when numbers get
really big!
((1<<31)//900)*1.5
3579138.0
GET FLAG!
picoCTF{
m0n3y_bag5_65d67a74}
Glory of the Garden
Description:This garden contains more than it seems
Hints:What is a hex editor?
使用010 editor打开
GET FLAG!
picoCTF{
more_than_m33ts_the_3y33dd2eEF5}
Insp3ct0r
Description:Kishor Balan tipped us off that the following code may
need inspection: https://jupiter.challenges.picoctf.org/problem/51418/
(link) or http://jupiter.challenges.picoctf.org:51418 Hints:
1.How do you inspect web code on a browser?
2.There’s 3 parts
GET FLAG!
picoCTF{
tru3_d3t3ct1ve_0r_ju5t_lucky?2e7b23e3}
dont-use-client-side
Description:Can you break into this super secure portal?
https://jupiter.challenges.picoctf.org/problem/61882/ (link) or
http://jupiter.challenges.picoctf.org:61882 Hints:Never trust the
client
GET FLAG!
picoCTF{
no_clients_plz_b706c5}
So Meta
Description:Find the flag in this picture.
Hints:
1.What does meta mean in the context of files?
2.Ever heard of metadata?
010 editor打开
GET FLAG!
picoCTF{
s0_m3ta_d8944929}
extensions
Description:This is a really weird text file TXT? Can you find the
flag? Hints:
1.How do operating systems know what kind of file it is? (It’s not just the ending!
2.Make sure to submit the flag as picoCTF{XXXXX}
$ file flag.txt
flag.txt: PNG image data, 1697 x 608, 8-bit/color RGB, non-interlaced
GET FLAG!
picoCTF{
now_you_know_about_extensions}
Flags
国际信号旗
GET FLAG!
PICOCTF{
F1AG5AND5TUFF}
Tapping
Description:Theres tapping coming in from the wires. What’s it saying nc jupiter.challenges.picoctf.org 28927
Hints:
1.What kind of encoding uses dashes and dots?
2.The flag is in the format PICOCTF{}
GET FLAG!
PICOCTF{
M0RS3C0D31SFUN1261438181}
la cifra de
Description:I found this cipher in an old book. Can you figure out what it says? Connect with nc jupiter.challenges.picoctf.org 50523
Hints:
1.There are tools that make this easy
2.Perhaps looking at history will help
https://github.com/d4rkvaibhav/picoCTF-2018-Writeups/tree/master/Cryptography/blaise
hgqqpohzCZK{
m311a50_0x_a1rn3x3_h1ah3x6kp60egf}
维吉尼亚密码
key = FLAG
GET FLAG!
picoCTF{
b311a50_0r_v1gn3r3_c1ph3r6fe60eaa}
what’s a net cat?
Description:Using netcat (nc) is going to be pretty important.
Can you connect to jupiter.challenges.picoctf.org at port 29138
to get the flag?
Hints:nc tutorial
GET