Nouman RahmanforProgrammingFireprogrammingfire.hashnode.net·Oct 14, 2022picoCTF 2022: Cryptography: basic-mod1Introduction Challenge: basic-mod1 Category: Cryptography Description: We found this weird message being passed around on the servers, we think we have a working decryption scheme. Download the message here. Take each number mod 37 and map it to the ...Discuss·10 likes·640 readspicoCTF 2022Cryptography
Nouman RahmanforProgrammingFireprogrammingfire.hashnode.net·Oct 15, 2022picoCTF 2022: Binary Exploitation: buffer overflow 0Introduction Challenge: buffer overflow 0 Category: Binary Exploitation Description: Smash the stack. Let's start off simple, can you overflow the correct buffer? The program is available here. You can view the source here. And connect with it using:...Discuss·10 likes·653 readspicoCTF 2022Binary Exploitation
Nouman RahmanforProgrammingFireprogrammingfire.hashnode.net·Oct 14, 2022picoCTF 2022: Binary Exploitation: basic-file-exploitIntroduction Challenge: basic-file-exploit Category: Binary Exploitation Description: The program provided allows you to write to a file and read what you wrote from it. Try playing around with it and see if you can break it! Connect to the program ...Discuss·10 likes·494 readspicoCTF 2022picoCTF 2022
Nouman RahmanforProgrammingFireprogrammingfire.hashnode.net·Oct 15, 2022picoCTF 2022: Cryptography: credstuffIntroduction Challenge: credstuff Category: Cryptography Description: We found a leak of a black-market website's login credentials. Can you find the password of the user cultiris and successfully decrypt it? Download the leak here. The first user in...Discuss·10 likes·406 readspicoCTF 2022Cryptography
Nouman RahmanforProgrammingFireprogrammingfire.hashnode.net·Oct 15, 2022picoCTF 2022: Binary Exploitation: buffer overflow 0Introduction Challenge: buffer overflow 0 Category: Binary Exploitation Description: Smash the stack. Let's start off simple, can you overflow the correct buffer? The program is available here. You can view the source here. And connect with it using:...Discuss·10 likes·653 readspicoCTF 2022Binary Exploitation
Nouman RahmanforProgrammingFireprogrammingfire.hashnode.net·Oct 14, 2022picoCTF 2022: Cryptography: basic-mod-2Introduction Challenge: basic-mod-2 Category: Cryptography Description: A new modular challenge! Download the message here. Take each number mod 41 and find the modular inverse for the result. Then map to the following character set: 1-26 are the al...Discuss·10 likes·433 readspicoCTF 2022Cryptography
Nouman RahmanforProgrammingFireprogrammingfire.hashnode.net·Oct 14, 2022picoCTF 2022: Cryptography: basic-mod1Introduction Challenge: basic-mod1 Category: Cryptography Description: We found this weird message being passed around on the servers, we think we have a working decryption scheme. Download the message here. Take each number mod 37 and map it to the ...Discuss·10 likes·640 readspicoCTF 2022Cryptography
Nouman RahmanforProgrammingFireprogrammingfire.hashnode.net·Oct 14, 2022picoCTF 2022: Binary Exploitation: basic-file-exploitIntroduction Challenge: basic-file-exploit Category: Binary Exploitation Description: The program provided allows you to write to a file and read what you wrote from it. Try playing around with it and see if you can break it! Connect to the program ...Discuss·10 likes·494 readspicoCTF 2022picoCTF 2022