picoctf-2019-solutions icon indicating copy to clipboard operation
picoctf-2019-solutions copied to clipboard

PicoCTF 2019 Solutions

PicoCTF 2019 Solutions

This is a dump of many of our PicoCTF 2019 solutions. Most solutions included here are ones that were solved with code, though some of them were done by hand.

Recommended tools

Here are some recommended tools that we used to complete these challenges

General

  • www.google.com (infinite knowledge)
  • https://en.wikipedia.org (finite knowledge)
  • Python (programming solutions)
  • C# (programming solutions)
  • www.base64encode.org (encoding/decoding base64)
  • www.rapidtables.com (converting integer bases and encodings)
  • VMWare Workstation (Windows/Linux/Android virtual machines)
  • VirtualBox (Windows/Linux virtual machines)
  • Notepad++ (half decent text editor)
  • Visual Studio Code (half decent cross-platform text editor)

Binary Exploitation

  • Ghidra (reversing)
  • IDA (reversing, patching)
  • gdb (debugging)
  • pwntools Python module (programming solutions)
  • ROPgadget (ropchain generation)

Forensics/Reversing

  • Ghidra (reversing)
  • IDA (reversing, patching)
  • HxD (hex editor)
  • jd-gui (Java decompiler)
  • dextools (APK to JAR converter)
  • apktool (APK extractor)
  • LuckyPatcher (signing recompiled APKs)
  • Android Studio (android emulator)
  • Android Emulator for Visual Studio (android emulator)

Web Exploitation

  • Chrome Devtools (monitoring browser network traffic, controlling environment)
  • CharlesProxy (monitoring network traffic)
  • EditThisCookie (quickly editing cookies w/o devtools)
  • JohnTheRipper (secret key cracker)
  • www.jwt.io (JWT cookie editor)

Solution Index

Binary Exploitation

Cryptography

  • 13 (solved)
  • AES-ABC (solved)
  • b00tl3gRSA2 (solved)
  • b00tl3gRSA3 (solved)
  • caesar (solved)
  • Easy1 (solved)
  • Flags (solved)
  • john_pollard (solved)
  • la cifra de (solved)
  • miniRSA (solved)
  • Mr-Worldwide (solved)
  • rsa-pop-quiz (solved)
  • Tapping (solved)
  • The Numbers (solved)
  • waves over lambda (solved)

Forensics

General Skills

  • 1_wanna_b3_a_r0ck5tar (solved)
  • 2Warm (solved)
  • Based (solved)
  • Bases (solved)
  • First Grep (solved)
  • First Grep: Part II (solved)
  • flag_shop (solved)
  • Lets Warm Up (solved)
  • mus1c (solved)
  • plumbing (solved)
  • Resources (solved)
  • strings it (solved)
  • Warmed Up (solved)
  • what's a net cat? (solved)
  • whats-the-difference (solved)
  • where-is-the-file (solved)
  • The Factory's Secret (solved)

Reversing

Web Exploitation

  • cereal hacker 1 (solved)
  • cereal hacker 2 (solved)
  • Client-side-again (solved)
  • dont-use-client-side (solved)
  • Empire1 (solved)
  • Empire2 (solved)
  • Empire3 (solved)
  • Insp3ct0r (solved)
  • Irish-Name-Repo 1 (solved)
  • Irish-Name-Repo 2 (solved)
  • Irish-Name-Repo 3 (solved)
  • JaWT Scratchpad (solved)
  • logon (solved)
  • Open-to-admins (solved)
  • picobrowser (solved)
  • where are the robots (solved)
  • Java Script Kiddie (solved)
  • Java Script Kiddie 2 (solved)