picoCTF 2018
Overview
https://2018game.picoctf.com/problems solved in bash and js.
Forensics Warmup 1
Can you unzip this file for me and retreive the flag?
picoCTF{welcome_to_forensics}
unzip flag.zip
# get flag in imageForensics Warmup 2
Hmm for some reason I can't open this PNG? Any ideas?
picoCTF{extensions_are_a_lie}
file flag.png
mv flag.png flag.jpeg
# get flag in imageGeneral Warmup 1
If I told you your grade was
0x41in hexadecimal, what would it be in ASCII?
picoCTF{A}
echo "41" | xxd -r -pGeneral Warmup 2
Can you convert the number 27 (base 10) to binary (base 2)?
picoCTF{11011}
echo "obase=2; ibase=10; 27" | bcGeneral Warmup 3
What is
0x3D(base 16) in decimal (base 10).
picoCTF{61}
echo "obase=10; ibase=16; 3D" | bcResources
We put together a bunch of resources to help you out on our website! If you go over there, you might even find a flag! https://picoctf.com/resources (link)
picoCTF{xiexie_ni_lai_zheli}
Reversing Warmup 1
Throughout your journey you will have to run many programs. Can you navigate to
/problems/reversing-warmup-1_0_f99f89de33522c93964bdec49fb2b838on the shell server and run this program to retreive the flag?
picoCTF{welc0m3_t0_r3VeRs1nG}
Simply run ./run in the shell server
Reversing Warmup 2
Can you decode the following string
dGg0dF93NHNfczFtcEwzfrom base64 format to ASCII?
picoCTF{th4t_w4s_s1mpL3}
echo "dGg0dF93NHNfczFtcEwz" | base64 -DCrypto Warmup 1
Crpyto can often be done by hand, here's a message you got from a friend,
llkjmlmpadkkcwith the key ofthisisalilkey. Can you use this table to solve it?.``