id
int64 3
425
| name
stringlengths 2
32
| answer
stringlengths 1
63
| question
stringlengths 10
603
| hints
listlengths 0
6
| files
listlengths 0
4
| category
stringclasses 6
values | difficulty
stringclasses 3
values |
|---|---|---|---|---|---|---|---|
177
|
Most Cookies
|
pwn_4ll_th3_cook1E5_3646b931
|
Alright, enough of using my own encryption. Flask session cookies should be plenty secure! http://mercury.picoctf.net:53700/
|
[
"How secure is a flask cookie?"
] |
[
"https://mercury.picoctf.net/static/e99686c2e3e6cdd9e355f1d10c9d80d6/server.py"
] |
Web Exploitation
|
Medium
|
88
|
Web Gauntlet
|
y0u_m4d3_1t_a3ed4355668e74af0ecbb7496c8dd7c5
|
Can you beat the filters? Log in as admin http://jupiter.challenges.picoctf.org:29164/ http://jupiter.challenges.picoctf.org:29164/filter.php
|
[
"You are not allowed to login with valid credentials.",
"Write down the injections you use in case you lose your progress.",
"For some filters it may be hard to see the characters, always (always) look at the raw hex in the response.",
"sqlite",
"If your cookie keeps getting reset, try using a private browser window"
] |
[] |
Web Exploitation
|
Medium
|
174
|
Web Gauntlet 2
|
0n3_m0r3_t1m3_e2db86ae880862ad471aa4c93343b2bf
|
This website looks familiar... Log in as admin Site: http://mercury.picoctf.net:65261/ Filter: http://mercury.picoctf.net:65261/filter.php
|
[
"I tried to make it a little bit less contrived since the mini competition.",
"Each filter is separated by a space. Spaces are not filtered.",
"There is only 1 round this time, when you beat it the flag will be in filter.php.",
"There is a length component now.",
"sqlite"
] |
[] |
Web Exploitation
|
Medium
|
173
|
Cookies
|
3v3ry1_l0v3s_c00k135_a1f5bdb7
|
Who doesn't love cookies? Try to figure out the best one. http://mercury.picoctf.net:29649/
|
[] |
[] |
Web Exploitation
|
Easy
|
170
|
Wave a flag
|
b1scu1ts_4nd_gr4vy_f0668f62
|
Can you invoke help flags for a tool or binary? This program has extraordinarily helpful information...
|
[
"This program will only work in the webshell or another Linux computer.",
"Run this program by entering the following in the Terminal prompt: $ ./warm, but you'll first have to make it executable with $ chmod +x warm",
"-h and --help are the most common arguments to give to programs to get more information from them!",
"Not every program implements help features like -h and --help."
] |
[
"https://mercury.picoctf.net/static/f95b1ee9f29d631d99073e34703a2826/warm"
] |
General Skills
|
Easy
|
166
|
Python Wrangling
|
4p0110_1n_7h3_h0us3_ac9bd0ff
|
Python scripts are invoked kind of like programs in the Terminal... Can you run this Python script using this password to get the flag?
|
[
"$ man python"
] |
[
"https://mercury.picoctf.net/static/325a52d249be0bd3811421eacd2c877a/ende.py",
"https://mercury.picoctf.net/static/325a52d249be0bd3811421eacd2c877a/pw.txt",
"https://mercury.picoctf.net/static/325a52d249be0bd3811421eacd2c877a/flag.txt.en"
] |
General Skills
|
Easy
|
165
|
Hurry up! Wait!
|
d15a5m_ftw_a82650a
|
svchost.exe
|
[] |
[
"https://mercury.picoctf.net/static/18afff80df59ffe13188a4907089ec8d/svchost.exe"
] |
Reverse Engineering
|
Hard
|
162
|
Mind your Ps and Qs
|
sma11_N_n0_g0od_13686679
|
In RSA, a small e value can be problematic, but what about N? Can you decrypt this? values
|
[
"Bits are expensive, I used only a little bit over 100 to save money"
] |
[
"https://mercury.picoctf.net/static/2604f8b51a5cc62d38a3736938f19cef/values"
] |
Cryptography
|
Medium
|
161
|
Scavenger Hunt
|
th4ts_4_l0t_0f_pl4c3s_2_lO0k_fa04427c
|
There is some interesting information hidden around this site http://mercury.picoctf.net:39698/. Can you find it?
|
[
"You should have enough hints to find the files, don't run a brute forcer."
] |
[] |
Web Exploitation
|
Easy
|
156
|
Nice netcat...
|
g00d_k1tty!_n1c3_k1tty!_afd5fda4
|
There is a nice program that you can talk to by using this command in a shell: $ nc mercury.picoctf.net 21135, but it doesn't speak English...
|
[
"You can practice using netcat with this picoGym problem: what's a netcat? (https://play.picoctf.org/practice/challenge/34",
"You can practice reading and writing ASCII with this picoGym problem: Let's Warm Up (https://play.picoctf.org/practice/challenge/22)"
] |
[] |
General Skills
|
Easy
|
147
|
Obedient Cat
|
s4n1ty_v3r1f13d_2fd6ed29
|
This file has a flag in plain sight (aka "in-the-clear").
|
[
"$ man cat"
] |
[
"https://mercury.picoctf.net/static/0e428b2db9788d31189329bed089ce98/flag"
] |
General Skills
|
Easy
|
137
|
Disk, disk, sleuth! II
|
f0r3ns1c4t0r_n0v1c3_f5565e7b
|
All we know is the file with the flag is named `down-at-the-bottom.txt`... Disk image: dds2-alpine.flag.img.gz
|
[
"The sleuthkit has some great tools for this challenge as well.",
"Sleuthkit docs here are so helpful: TSK Tool Overview (http://wiki.sleuthkit.org/index.php?title=TSK_Tool_Overview)",
"This disk can also be booted with qemu!"
] |
[
"https://mercury.picoctf.net/static/aed64c508175df5fe23207c10e0e47e5/dds2-alpine.flag.img.gz"
] |
Forensics
|
Medium
|
134
|
Shop
|
b4d_brogrammer_3da34a8f
|
Best Stuff - Cheap Stuff, Buy Buy Buy... Store Instance: source. The shop is open for business at nc mercury.picoctf.net 10337.
|
[
"Always check edge cases when programming"
] |
[
"https://mercury.picoctf.net/static/73724c199e55e6c056bb00e7bbfdfb38/source"
] |
Reverse Engineering
|
Medium
|
202
|
caas
|
moooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo0o
|
Now presenting cowsay as a service https://caas.mars.picoctf.net/
|
[] |
[
"https://artifacts.picoctf.net/picoMini+by+redpwn/Web+Exploitation/caas/index.js"
] |
Web Exploitation
|
Medium
|
311
|
Torrent Analyze
|
ubuntu-19.10-desktop-amd64.iso
|
SOS, someone is torrenting on our network. One of your colleagues has been using torrent to download some files on the company's network. Can you identify the file(s) that were downloaded? The file name will be the flag, like picoCTF{filename}.
|
[
"Download and open the file with a packet analyzer like Wireshark.",
"You may want to enable BitTorrent protocol (BT-DHT, etc.) on Wireshark. Analyze -> Enabled Protocols",
"Try to understand peers, leechers and seeds. Article: https://www.techworm.net/2017/03/seeds-peers-leechers-torrents-language.html",
"The file name ends with .iso"
] |
[
"https://artifacts.picoctf.net/c/165/torrent.pcap"
] |
Forensics
|
Medium
|
132
|
GET aHEAD
|
r3j3ct_th3_du4l1ty_8f878508
|
Find the flag being held on this server to get ahead of the competition http://mercury.picoctf.net:34561/
|
[
"Maybe you have more than 2 choices",
"Check out tools like Burpsuite to modify your requests and look at the responses"
] |
[] |
Web Exploitation
|
Easy
|
104
|
Transformation
|
16_bits_inst34d_of_8_d52c6b93
|
I wonder what this really is... ''.join([chr((ord(flag[i]) << 8) + ord(flag[i + 1])) for i in range(0, len(flag), 2)])
|
[
"You may find some decoders online"
] |
[
"https://mercury.picoctf.net/static/a757282979af14ab5ed74f0ed5e2ca95/enc"
] |
Reverse Engineering
|
Easy
|
86
|
2Warm
|
101010
|
Can you convert the number 42 (base 10) to binary (base 2)?
|
[
"Submit your answer in our competition's flag format. For example, if your answer was '11111', you would submit 'picoCTF{11111}' as the flag."
] |
[] |
General Skills
|
Easy
|
416
|
FactCheck
|
wELF_d0N3_mate_2394047a
|
This binary is putting together some important piece of information... Can you uncover that information? Examine this file. Do you understand its inner workings?
|
[] |
[
"https://artifacts.picoctf.net/c_titan/190/bin"
] |
Reverse Engineering
|
Medium
|
415
|
endianness-v2
|
cert!f1Ed_iNd!4n_s0rrY_3nDian_76e05f49
|
Here's a file that was recovered from a 32-bits system that organized the bytes a weird way. We're not even sure what type of file it is. Download it here and see what you can get out of it
|
[] |
[
"https://artifacts.picoctf.net/c_titan/37/challengefile"
] |
Forensics
|
Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.