picoCTF 2022: binary-exploitation – RPS

Ulli Weichert/ April 5, 2022/ IT-Security, Write-Ups/ 0Kommentare

RPS Description Here’s a program that plays rock, paper, scissors against you. I hear something good happens if you win 5 times in a row. Connect to the program with netcat: nc saturn.picoctf.net 53296 The program’s source code with the flag redacted can be downloaded here. Solving Checking the code (as mentioned in the hint of the challenge) In the

Weiterlesen

picoCTF 2022: binary-exploitation – CVE-XXXX-XXXX

Ulli Weichert/ April 5, 2022/ IT-Security, Write-Ups/ 0Kommentare

CVE-XXXX-XXXX Description Enter the CVE of the vulnerability as the flag with the correct flag format: picoCTF{CVE-XXXX-XXXXX} replacing XXXX-XXXXX with the numbers for the matching vulnerability. The CVE we’re looking for is the first recorded remote code execution (RCE) vulnerability in 2021 in the Windows Print Spooler Service, which is available across desktop and server versions of Windows operating systems.

Weiterlesen

picoCTF 2022: binary-exploitation – basic-file-exploit

Ulli Weichert/ April 4, 2022/ IT-Security, Write-Ups/ 0Kommentare

basic-file-exploit Description The program provided allows you to write to a file and read what you wrote from it. Try playing around with it and see if you can break it! Connect to the program with netcat: $ nc saturn.picoctf.net 49698 The program’s source code with the flag redacted can be downloaded here. Solving Netcat into the service via given

Weiterlesen

picoCTF 2022: Crypto – substitution challenges

Ulli Weichert/ April 4, 2022/ IT-Security, Write-Ups/ 0Kommentare

Substitution Challenges Because this challenges are all very similar, we will not describe them in own articles 🙂 . Solving Substitutions cypher replace the 26 letters of an alphabet with other letters (one letter matches only one other). If you can find out which letter was replaced with which letter, then you can crack this cypher relatively easily. The best

Weiterlesen

picoCTF 2022: Crypto – rail-fence

Ulli Weichert/ April 3, 2022/ IT-Security, Write-Ups/ 0Kommentare

rail-fence Description A type of transposition cipher is the rail fence cipher, which is described here. Here is one such cipher encrypted using the rail fence with 4 rails. Can you decrypt it? Download the message here. Put the decoded message in the picoCTF flag format, picoCTF{decoded_message}. Solving So – there is everything we need to know in the challenge

Weiterlesen

picoCTF 2022: Crypto – Diffie Hellman

Ulli Weichert/ April 3, 2022/ IT-Security, Write-Ups/ 0Kommentare

diffie-hellman Description Alice and Bob wanted to exchange information secretly. The two of them agreed to use the Diffie-Hellman key exchange algorithm, using p = 13 and g = 5. They both chose numbers secretly where Alice chose 7 and Bob chose 3. Then, Alice sent Bob some encoded text (with both letters and digits) using the generated key as

Weiterlesen