id
int64
3
425
name
stringlengths
2
32
answer
stringlengths
1
63
question
stringlengths
10
603
hints
listlengths
0
6
files
listlengths
0
4
category
stringclasses
6 values
difficulty
stringclasses
3 values
177
Most Cookies
pwn_4ll_th3_cook1E5_3646b931
Alright, enough of using my own encryption. Flask session cookies should be plenty secure! http://mercury.picoctf.net:53700/
[ "How secure is a flask cookie?" ]
[ "https://mercury.picoctf.net/static/e99686c2e3e6cdd9e355f1d10c9d80d6/server.py" ]
Web Exploitation
Medium
88
Web Gauntlet
y0u_m4d3_1t_a3ed4355668e74af0ecbb7496c8dd7c5
Can you beat the filters? Log in as admin http://jupiter.challenges.picoctf.org:29164/ http://jupiter.challenges.picoctf.org:29164/filter.php
[ "You are not allowed to login with valid credentials.", "Write down the injections you use in case you lose your progress.", "For some filters it may be hard to see the characters, always (always) look at the raw hex in the response.", "sqlite", "If your cookie keeps getting reset, try using a private browser window" ]
[]
Web Exploitation
Medium
174
Web Gauntlet 2
0n3_m0r3_t1m3_e2db86ae880862ad471aa4c93343b2bf
This website looks familiar... Log in as admin Site: http://mercury.picoctf.net:65261/ Filter: http://mercury.picoctf.net:65261/filter.php
[ "I tried to make it a little bit less contrived since the mini competition.", "Each filter is separated by a space. Spaces are not filtered.", "There is only 1 round this time, when you beat it the flag will be in filter.php.", "There is a length component now.", "sqlite" ]
[]
Web Exploitation
Medium
173
Cookies
3v3ry1_l0v3s_c00k135_a1f5bdb7
Who doesn't love cookies? Try to figure out the best one. http://mercury.picoctf.net:29649/
[]
[]
Web Exploitation
Easy
170
Wave a flag
b1scu1ts_4nd_gr4vy_f0668f62
Can you invoke help flags for a tool or binary? This program has extraordinarily helpful information...
[ "This program will only work in the webshell or another Linux computer.", "Run this program by entering the following in the Terminal prompt: $ ./warm, but you'll first have to make it executable with $ chmod +x warm", "-h and --help are the most common arguments to give to programs to get more information from them!", "Not every program implements help features like -h and --help." ]
[ "https://mercury.picoctf.net/static/f95b1ee9f29d631d99073e34703a2826/warm" ]
General Skills
Easy
166
Python Wrangling
4p0110_1n_7h3_h0us3_ac9bd0ff
Python scripts are invoked kind of like programs in the Terminal... Can you run this Python script using this password to get the flag?
[ "$ man python" ]
[ "https://mercury.picoctf.net/static/325a52d249be0bd3811421eacd2c877a/ende.py", "https://mercury.picoctf.net/static/325a52d249be0bd3811421eacd2c877a/pw.txt", "https://mercury.picoctf.net/static/325a52d249be0bd3811421eacd2c877a/flag.txt.en" ]
General Skills
Easy
165
Hurry up! Wait!
d15a5m_ftw_a82650a
svchost.exe
[]
[ "https://mercury.picoctf.net/static/18afff80df59ffe13188a4907089ec8d/svchost.exe" ]
Reverse Engineering
Hard
162
Mind your Ps and Qs
sma11_N_n0_g0od_13686679
In RSA, a small e value can be problematic, but what about N? Can you decrypt this? values
[ "Bits are expensive, I used only a little bit over 100 to save money" ]
[ "https://mercury.picoctf.net/static/2604f8b51a5cc62d38a3736938f19cef/values" ]
Cryptography
Medium
161
Scavenger Hunt
th4ts_4_l0t_0f_pl4c3s_2_lO0k_fa04427c
There is some interesting information hidden around this site http://mercury.picoctf.net:39698/. Can you find it?
[ "You should have enough hints to find the files, don't run a brute forcer." ]
[]
Web Exploitation
Easy
156
Nice netcat...
g00d_k1tty!_n1c3_k1tty!_afd5fda4
There is a nice program that you can talk to by using this command in a shell: $ nc mercury.picoctf.net 21135, but it doesn't speak English...
[ "You can practice using netcat with this picoGym problem: what's a netcat? (https://play.picoctf.org/practice/challenge/34", "You can practice reading and writing ASCII with this picoGym problem: Let's Warm Up (https://play.picoctf.org/practice/challenge/22)" ]
[]
General Skills
Easy
147
Obedient Cat
s4n1ty_v3r1f13d_2fd6ed29
This file has a flag in plain sight (aka "in-the-clear").
[ "$ man cat" ]
[ "https://mercury.picoctf.net/static/0e428b2db9788d31189329bed089ce98/flag" ]
General Skills
Easy
137
Disk, disk, sleuth! II
f0r3ns1c4t0r_n0v1c3_f5565e7b
All we know is the file with the flag is named `down-at-the-bottom.txt`... Disk image: dds2-alpine.flag.img.gz
[ "The sleuthkit has some great tools for this challenge as well.", "Sleuthkit docs here are so helpful: TSK Tool Overview (http://wiki.sleuthkit.org/index.php?title=TSK_Tool_Overview)", "This disk can also be booted with qemu!" ]
[ "https://mercury.picoctf.net/static/aed64c508175df5fe23207c10e0e47e5/dds2-alpine.flag.img.gz" ]
Forensics
Medium
134
Shop
b4d_brogrammer_3da34a8f
Best Stuff - Cheap Stuff, Buy Buy Buy... Store Instance: source. The shop is open for business at nc mercury.picoctf.net 10337.
[ "Always check edge cases when programming" ]
[ "https://mercury.picoctf.net/static/73724c199e55e6c056bb00e7bbfdfb38/source" ]
Reverse Engineering
Medium
202
caas
moooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo0o
Now presenting cowsay as a service https://caas.mars.picoctf.net/
[]
[ "https://artifacts.picoctf.net/picoMini+by+redpwn/Web+Exploitation/caas/index.js" ]
Web Exploitation
Medium
311
Torrent Analyze
ubuntu-19.10-desktop-amd64.iso
SOS, someone is torrenting on our network. One of your colleagues has been using torrent to download some files on the company's network. Can you identify the file(s) that were downloaded? The file name will be the flag, like picoCTF{filename}.
[ "Download and open the file with a packet analyzer like Wireshark.", "You may want to enable BitTorrent protocol (BT-DHT, etc.) on Wireshark. Analyze -> Enabled Protocols", "Try to understand peers, leechers and seeds. Article: https://www.techworm.net/2017/03/seeds-peers-leechers-torrents-language.html", "The file name ends with .iso" ]
[ "https://artifacts.picoctf.net/c/165/torrent.pcap" ]
Forensics
Medium
132
GET aHEAD
r3j3ct_th3_du4l1ty_8f878508
Find the flag being held on this server to get ahead of the competition http://mercury.picoctf.net:34561/
[ "Maybe you have more than 2 choices", "Check out tools like Burpsuite to modify your requests and look at the responses" ]
[]
Web Exploitation
Easy
104
Transformation
16_bits_inst34d_of_8_d52c6b93
I wonder what this really is... ''.join([chr((ord(flag[i]) << 8) + ord(flag[i + 1])) for i in range(0, len(flag), 2)])
[ "You may find some decoders online" ]
[ "https://mercury.picoctf.net/static/a757282979af14ab5ed74f0ed5e2ca95/enc" ]
Reverse Engineering
Easy
86
2Warm
101010
Can you convert the number 42 (base 10) to binary (base 2)?
[ "Submit your answer in our competition's flag format. For example, if your answer was '11111', you would submit 'picoCTF{11111}' as the flag." ]
[]
General Skills
Easy
416
FactCheck
wELF_d0N3_mate_2394047a
This binary is putting together some important piece of information... Can you uncover that information? Examine this file. Do you understand its inner workings?
[]
[ "https://artifacts.picoctf.net/c_titan/190/bin" ]
Reverse Engineering
Medium
415
endianness-v2
cert!f1Ed_iNd!4n_s0rrY_3nDian_76e05f49
Here's a file that was recovered from a 32-bits system that organized the bytes a weird way. We're not even sure what type of file it is. Download it here and see what you can get out of it
[]
[ "https://artifacts.picoctf.net/c_titan/37/challengefile" ]
Forensics
Medium