PicoCTF 2019 — General Skills

Kamran Saifullah
4 min readOct 26, 2019

I have been thinking to write the solutions of the PicoCTF challenges that i was able to solve by myself and then my exams at university started. Just got free today from my theoretical exams and i am not muhc worried about my practical lab exams. Those are easy.

So this article is all about how i solved the PicoCTF General Challenges. So let’s dive into solving the challenges one by one!

2Warm — Points: 50

This is an easy challenge and by using python we can do it by using “bin” function.

Flag: picoCTF{101010}

Lets Warm Up — Points: 50

This can be solved by using python again and by using “int” function and then “chr” function to convert the integer value to its corresponding ASCII character!

Flag: picoCTF{p}

Warmed Up — Points: 50

This challenge can be solved using the python again. We only need to convert the hex value to decimal and it can be done by using “int” function.

Flag: picoCTF{61}

Bases — Points: 100

We are provided with the base value. This is a base64 encoded data. It can be decoded using “base64” utility.

Flag: picoCTF{l3arn_th3_r0p35r}

First Grep — Points: 100

We are provided with the file and as the name suggests we need to grep the flag. This can be done by using “cat” and “grep” command.

Resources — Points: 100

We are provided with a link in this challenge. Let’s open it up and find the flag.

On scrolling down the main page we can find our flag!

strings it — Points: 100

We are provided with the file. All we need is to perform a “strings” and “grep” the flag!

what’s a net cat? — Points: 100

All we need is to connect via NC and grab the flag!

plumbing — Points: 200

So the problem states that we need to copy the contents of the program to an external file and need to find the flag from inside it.

whats-the-difference — Points: 200

In this challenge. We are provided with two images. All we need is to create a difference. This can be done by using a simple python script. Which makes a difference and store the data together.

On running this little script we get our flag!

Flag: picoCTF{th3yr3_a5_d1ff3r3nt_4s_bu773r_4nd_j311y_aslkjfdsalkfslkflkjdsfdszmz10548}

The rest of the challenges solutions will be added here after a short period of time!

--

--

Kamran Saifullah

Malware/RE/Firmware Analysis, App Sec/Off Sec, VAPT, Phishing Simulations/SE | Risk Management, IS Governance, Audits, ISO 27001 LI