Professional Documents
Culture Documents
T1 05211740000080
T1 05211740000080
Solve Hints
Okay, so we found some important looking files on a linux computer. Maybe they can be used to get a password to the process. Connect with nc 2018shell.picoctf.com
35225 . Files can be found here: passwd shadow.
Submit!
Solve Hints
Can you find the flag in this file without actually running it? You can also find the file in /problems/strings_3_1dbaafa1f8f0556872cad33e16bc8dc7 on the shell server.
Submit!
Solve Hints
This one is a little bit harder. Can you find the flag in /problems/grep-2_4_06c2058761f24267033e7ca6ff9d9144/files on the shell server? Remember, grep is your friend.
Submit!
Solve Hints
It's never a bad idea to brush up on those linux skills or even learn some new ones before you set off on this adventure! Connect with nc 2018shell.picoctf.com 6903 .
Submit!
Client Side is Still Bad - Points: 150 - (Solves: 20875) Web Exploitation - Solved
Reading Between the Eyes - Points: 150 - (Solves: 10374) Forensics - Solved
Recovering From the Snap - Points: 150 - (Solves: 8060) Forensics - Solved
Solve Hints
What does asm0(0x2a,0x4f) return? Submit the flag as a hexadecimal value (starting with '0x'). NOTE: Your submission for this question will NOT be in the normal flag
format. Source located in the directory at /problems/assembly-0_3_b7d6c21be1cefd3e53335a66e7815307.
Submit!
Solve Hints
Here's another simple cipher for you where we made a bunch of substitutions. Can you decrypt it? Connect with nc 2018shell.picoctf.com 48186 .
Submit!
Solve Hints
This cat has a secret to teach you. You can also find the file in /problems/hex-editor_1_10cafee5618ce2cfe32f2188ca1f472e on the shell server.
Submit!
Irish Name Repo - Points: 200 - (Solves: 10940) Web Exploitation - Solved
Solve Hints
Can you help us find the flag in this Meta-Material? You can also find the file in /problems/truly-an-artist_3_066d6319e350c1d579e5cf32e326ba02.
Submit!
Solve Hints
You find this when searching for some music, which leads you to be-quick-or-be-dead-1. Can you run it fast enough? You can also find the executable in /problems/be-
quick-or-be-dead-1_4_98374389c5652d0b16055427532f098f.
Submit!
Solve Hints
My buddy Blaise told me he learned about this cool cipher invented by a guy also named Blaise! Can you figure out what it says? Connect with nc
2018shell.picoctf.com 46966 .
Submit!
Solve Hints
Okay now you're cooking! This time can you overflow the buffer and return to the flag function in this program? You can find it in /problems/buffer-overflow-
1_4_9d46ad1b74894db5d4831b91e19ee709 on the shell server. Source.
Submit!
Solve Hints
Can you authenticate to this service and get the flag? Connect with nc 2018shell.picoctf.com 31045 . Source.
Submit!
Solve Hints
We heard that there is something hidden in this picture. Can you find it?
Submit!
Solve Hints
This program executes any input you give it. Can you get a shell? You can find the program in /problems/shellcode_4_99838609970da2f5f6cf39d6d9ed57cd on the shell
server. Source.
Submit!
what base is this? - Points: 200 - (Solves: 9342) General Skills - Unsolved
Solve Hints
To be successful on your mission, you must be able read data represented in different ways, such as hexadecimal or binary. Can you get the flag from this program to
prove you are ready? Connect with nc 2018shell.picoctf.com 31711 .
Submit!
you can't see me - Points: 200 - (Solves: 7151) General Skills - Unsolved
Solve Hints
'...reading transmission... Y.O.U. .C.A.N.'.T. .S.E.E. .M.E. ...transmission ended...' Maybe something lies in /problems/you-can-t-see-
me_3_1a39ec6c80b3f3a18610074f68acfe69.
Submit!
Solve Hints
There is a website running at http://2018shell.picoctf.com:65107 (link). Try to see if you can push their buttons.
Submit!
Solve Hints
We salvaged a ruined Ext SuperMagic II-class mech recently and pulled the filesystem out of the black box. It looks a bit corrupted, but maybe there's something
interesting in there. You can also find it in /problems/ext-super-magic_3_debae27da9f20eec855067f3e83b45f3 on the shell server.
Submit!
Solve Hints
There is a website running at http://2018shell.picoctf.com:49030 (link). Try to see if you can login!
Submit!
What's My Name? - Points: 250 - (Solves: 5364) Forensics - Unsolved
Solve Hints
Submit!
Solve Hints
In a filesystem, everything is relative ¯\_(ツ)_/¯. Can you find a way to get a flag from this program? You can find it in /problems/absolutely-
relative_2_69862edfe341b57b6ed2c62c7107daee on the shell server. Source.
Submit!
Hints
Solve
This program gives you the address of some system calls. Can you get a shell? You can find the program in /problems/got-2-learn-
libc_0_4c2b153da9980f0b2d12a128ff19dc3f on the shell server. Source.
Submit!
Solve Hints
We ran into some weird puzzles we think may mean something, can you help me solve one? Connect with nc 2018shell.picoctf.com 18148
Submit!
Solve Hints
Can you utlize stdin, stdout, and stderr to get the flag from this program? You can also find it in /problems/in-out-error_1_24ebc7186086f0f9a710de008628c561 on the
shell server
Submit!
Artisinal Handcrafted HTTP 3 - Points: 300 - (Solves: 1035) Web Exploitation - Unsolved
Solve Hints
We found a hidden flag server hiding behind a proxy, but the proxy has some... _interesting_ ideas of what qualifies someone to make HTTP requests. Looks like you'll
have to do this one by hand. Try connecting via nc 2018shell.picoctf.com 4914 , and use the proxy to send HTTP requests to `flag.local`. We've also recovered a
username and a password for you to use on the login page: `realbusinessuser`/`potoooooooo`.
Submit!
Solve Hints
This program prints any input you give it. Can you leak the flag? Connect with nc 2018shell.picoctf.com 34802 . Source.
Submit!
Solve Hints
Using a debugging tool will be extremely useful on your missions. Can you run this program in gdb and find the flag? You can find the file in /problems/learn-
gdb_4_2ca642e0eb4e21999bb1e6650342e545 on the shell server.
Submit!
Flaskcards - Points: 350 - (Solves: 2517) Web Exploitation - Unsolved
Solve Hints
We found this fishy website for flashcards that we think may be sending secrets. Could you take a look?
Submit!
Solve Hints
Can you authenticate to this service and get the flag? Connect to it with nc 2018shell.picoctf.com 3582 . Source
Submit!
Solve Hints
There has been some malware detected, can you help with the analysis? More info here. Connect with nc 2018shell.picoctf.com 46111 .
Submit!
Solve Hints
One of my school mate developed an alive monitoring tool. Can you get a flag from http://2018shell.picoctf.com:31070 (link)?
Submit!
Solve Hints
We started a little store, can you buy the flag? Source. Connect with 2018shell.picoctf.com 10740 .
Submit!
Solve Hints
Can you help us retreive the flag from this crypto service? Connect with nc 2018shell.picoctf.com 45008 . We were able to recover some Source Code.
Submit!
Solve Hints
Uh oh, the login page is more secure... I think. http://2018shell.picoctf.com:13747 (link). Source.
Submit!
Solve Hints
Can you understand the language and answer the questions to retrieve the flag? Connect to the service with nc 2018shell.picoctf.com 22973
Submit!
Solve Hints
Can you find the flag encoded inside this image? You can also find the file in /problems/loadsomebits_4_7be73021cd0c9c84b08937323b0d6ae1 on the shell server.
Submit!
Help Me Reset 2 - Points: 600 - (Solves: 1587) Web Exploitation - Unsolved
Solve Hints
There is a website running at http://2018shell.picoctf.com:45948 (link). We need to get into any user for a flag!
Submit!
Solve Hints
There is a website running at http://2018shell.picoctf.com:15987 (link). Try to see if you can answer its question.
Submit!
Solve Hints
C? Who uses that anymore. If we really want to be secure, we should all start learning lambda calculus. http://2018shell.picoctf.com:59404 (link)
Submit!
Solve Hints
Dressing up dogs are kinda the new thing, see if you can get this lovely girl ready for her costume party. Dog Or Frog
Submit!
Hint: Have you checked-out our Game page? Besides seeing problems in a graphical format, there will be robots!