PicoCTF Writeups
-
go to admin login page, use admin’ — and start burpsuite and set debug=1 return to login page and done
-
seems pretty interesting, this is not the flag btw, i used https://cryptii.com/pipes/caesar-cipher and shifted it 25 times, i got the flag the flag will be like picoCTF{crossingtherubiconqilhsxrk}
-
i used this script for wiener import owiener c = 3340181608170902309815734942765196570768051032870732871059667376927383082933128304352606819441390895088626477666672629002453267885>e = 5657297947186700282010850148307178067982739472142926962005226056768989021819430337739531506015786643585353826670581021858868047195>n = 1249401782709235685346570536693129636197188157115848382401652810446499594692432926719092551056784130727797151307412097779382144349>d = owiener.attack(e, n) if d is None:print(“Failed”) else :print(“Hacked d = {}”.format(d))M = pow(c, d, n) print(“Decrypted message: “, M) ┌─[✗]─[alhamr@parrot]─[~]└──╼ $nano scxpt.py┌─[alhamr@parrot]─[~]└──╼ $python3 scxpt.pyTraceback (most recent call last):File “/home/alhamr/scxpt.py”, line 1, inimport owienerModuleNotFoundError: No module named ‘owiener’┌─[✗]─[alhamr@parrot]─[~]└──╼ $pip install…
-
i hate this challenge so much bro, but still let’s give a try again i took this script from https://blog.ramgi.dev/pico19aesabc.html to decode this because it was tough for me, we got image result and flag too,
-
Finally we got a morse code after a long time i decoded it by using https://www.dcode.fr/morse-code add PICOCTF{M0RS3C0D31SFUN1261438181} this is correct format
-
first of all download both image files run this script import numpy as npfrom PIL import Image im1 = Image.open(“scrambled1.png”)im2 = Image.open(“scrambled2.png”) im1np = np.array(im1)im2np = np.array(im2) result = im2np + im1np Image.fromarray(result).save(‘result.png’) run it now go to your file manager a new result.png file will be there
-
I decoded this by using https://www.guballa.de/substitution-solver
-
first of all i used this command openssl x509 -in cert -text -noout Breakdown: this is modulus we can decode it by using https://www.dcode.fr/prime-factors-decomposition in hint: The flag is in the format picoCTF{p,q} Try swapping p and q if it does not work assume that these are our p and q, lets swap them and…
-
Download and open the values file i decoded this by using https://www.dcode.fr/rsa-cipher here’s is the flag
-
download the png file its look like this i checked http://www.quadibloc.com/other/flaint.htm for this clue where first flag identifies P(apa) similarly others too we go this flag
