370 words
2 minutes
picoctf

Serpentine#

This is the most challenging question Ive solved (took me 6hrs), the logic is to open flag.txt or even run bash command without even typing the letters!

img1

So, after * I can tell there’s a folder called blargh.

img2

when run */*, it reveals a flag.txt inside blargh folder

img3

This is the secret: special bash variable $_ This can be used to see the last argument given to the previous command.

I asked my friend on more tips to solve this, and my friend gimme this link: Can Bash substring offset be omiited?

Finally with the help of the letters c, a, t from on-calastran.txt, i can finally read the flag.txt file

img4

Scan Surprise#

scan

this was the easiest thing ive done, just unzip files, open image and scan qr code.


Verify#

Author: Jeffery John Description People keep trying to trick my players with imitation flags. I want to make sure they get the real thing! I’m going to provide the SHA-256 hash and a decrypt script to help you know that my flags are legitimate.

img5

first thing first, open linux and run the script.

img6

After ls the files, i figured i can just loop them instead of checking one by one since its so tedious to do so.


information#

cat

This is prob the hardest ive done, because when i actually looked at the hint. Spoilers Alert: “look at the file” NOT THE CAT!

img7

So, i used exiftool to extract some juicy infos. At the beginning, i was like where’s the answer??? But when i take a deep look, and i paste everything into the cyberchef, i found this particular line (highlighted in green) delivered me straight to the answer


what’s a net cat?#

Using netcat (nc) is going to be pretty important. Can you connect to jupiter.challenges.picoctf.org at port 64287 to get the flag?

I find this interesting because of the title lol

First, install netcat on terminal. Then, Connect to the Host and Port: nc jupiter.challenges.picoctf.org 64287

img8

so ezzZ = =

Serpentine - Find the flag in the Python script!#

img9

This one is pretty easy, just call this function print_flag()

picoctf
https://fuwari.vercel.app/posts/picoctf/
Author
Bakayang
Published at
2024-09-09
License
CC BY-NC-SA 4.0