Advertisement
Jaw2966

Stanfield - March 31st 2020 CTF

Mar 31st, 2020
112
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.19 KB | None | 0 0
  1. ssh-keyz - Points: 150
  2. I had a tough time figuring out what it wanted me to do. I watched the tutorial and that put me on the right track, finished the problem on the first time through the tutorial I just missed one crucial step that made me think I did it wrong and made me go on a 45 goose chase trying to figure out what I did wrong. When you go to ssh into the web shell, it asks “Are you sure you want to continue connecting (yes/no) instead of typing “yes” I just hit enter and the connection would fail every time. Finally, after 45 min being stuck on the problem, I actually read that prompt and typed “Yes” and I connected fine. Big mad
  3. picoCTF{who_n33ds_p4ssw0rds_38dj21}
  4.  
  5. Irish Name Repo - Points: 200
  6. Took me a minute to poke around and actually find the menu on the top left of the webpage, but once I found it, I read in the support that the site uses SQL. So, I google common SQL injection codes and put them in until one gave me the flag
  7. picoCTF{con4n_r3411y_1snt_1r1sh_f58843c5}
  8. Mr. Robots - Points: 200
  9. Never heard of a /robots.txt before so I had no clue what the question was referencing. The only reason I finished the question is because of the help in the slack chat
  10. picoCTF{th3_w0rld_1s_4_danger0us_pl4c3_3lli0t_74efc}
  11. Truly an Artist - Points: 200
  12. I just went to the location and it was a file so after looking at the .png I strings it while grep for “pico” and I found it.
  13. leak-me - Points: 200
  14. This one took a while. I had to first figure out what language it was written in. After I figured out it was in C++, I looked up ways to pull the passwords.txt file. I didn’t get anywhere with that so I start going through the code one line at a time and figuring out what that line did. I eventually got to the line where it defined how many characters could be in the name field, 256 bytes. Once I figured out that it is actually called a buffer, I decided to look up how to do a buffer overflow. Which is just inputting more byte than it can handle, 256 bytes. I held down “q” in the name section for a minute or so until I figured it was over 256 bytes and clicked enter and boom after all the q’s was the password.
  15. picoCTF{aLw4y5_Ch3cK_tHe_bUfF3r_s1z3_d1667872}
  16. what base is this? - Points: 200
  17. Simple, just open a bunch of converters and be fast at copy and pasting.
  18. picoCTF{delusions_about_finding_values_5b21aa05}
  19. you can't see me - Points: 200
  20. I figured this one out as soon I read the question, I just had to find the hidden file. I went to the dir and ls –a to view the hidden file and knew something was there. I didn’t know how to view it, so I looked it up and figured out all you had to do was “./” then tab to complete it. Then I used cat to view the contents.
  21. The Vault - Points: 250
  22. In the source code, it had some SQL injection protection by checking for “OR” in the password. So I just tried the SQL UNION method that didn’t use “OR”
  23. picoCTF{w3lc0m3_t0_th3_vau1t_23495366}
  24. rsa-madlibs - Points: 250
  25. The first question was easy, find for n, n = p*q
  26. The second question was easy, it provided q and n and you had to find p, p=n/q
  27. The third question wasn’t doable
  28. The fourth question was not easy and I couldn’t figure it out.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement