Welcome to my write-up for all challenges in picoCTF 2022.
picoCTF 2022 is basically a big cyber competition made for all kinds of folks, from newbies to seasoned pros. They throw all sorts of challenges at you, covering everything from hacking to code-breaking. Here, I'm laying out how I tackled each challenge and what I learned along the way. Let's dive in!
- Challenge: codebook
- Challenge: convertme_py
- Challenge: fixme1_py
- Challenge: fixme2_py
- Challenge: glitch_cat
- Challenge: hashing_job_app
- Challenge: pw_crack1
- Challenge: pw_crack2
- Challenge: pw_crack3
- Challenge: pw_crack4
- Challenge: pw_crack5
- Challenge: runme.py
- Challenge: serpentine
- Challenge: Bbbbloat
- Challenge: file-run1
- Challenge: file-run2
- Challenge: fresh_java
- Challenge: bloat_py
- Challenge: patchme.py
- Challenge: safe_opener
- Challenge: unpackme.py
- Challenge: unpackme
- Challenge: GDB_Test_Drive
- Challenge: keygenme
- Challenge: basic_mod1
- Challenge: basic_mod2
- Challenge: credstuff
- Challenge: morse-code
- Challenge: rail-fence
- Challenge: substitution0
- Challenge: substitution1
- Challenge: substitution2
- Challenge: transposition-trial
- Challenge: vigenere
- Challenge: very_smooth
- Challenge: sequences
- Challenge: inspect_html
- Challenge: Includes
- Challenge: local_authority
- Challenge: search_source
- Challenge: forbidden_paths
- Challenge: power_cookie
- Challenge: roboto_sans
- Challenge: secrets
- Challenge: sql_direct
- Challenge: 'Enhance!'
- Challenge: file_types
- Challenge: lookey_here
- Challenge: packet_primer
- Challenge: redaction_gone_wrong
- Challenge: sleuthkit_intro
- Challenge: sleuthkit_apprentice
- Challenge: eavesdrop
- Challenge: st3g0
- Challenge: operation_orchid .
- Challenge: basic_file_exploit
- Challenge: buffer_overflow0
- Challenge: buffer_overflow1
- Challenge: RPS
- Challenge: x-sixty-what
- Challenge: buffer_overflow2
- Challenge: buffer_overflow3
- Challenge: flag_leak
- Challenge: wine
- Challenge: function_overwrite
- Challenge: ropfu