Pbjar CTF 2021
Last updated
Last updated
Description
I learned in my biology class that a polymer is a chain of monomers that can sometimes form long strings of molecules.
Solution
So doing a strings polymer | grep flag{ > outs.txt
give 425 lines with a lot of flag{n0t_th3_fl4g_l0l}
Replacing the fake flag with space and running strings outs.txt > | grep flag{
mr. i'll ask you what the real flag is flag{ju5t_4n0th3r_str1ng5_pr0bl3m_0159394921} think we'd all like to know.
Flag: flag{ju5t_4n0th3r_str1ng5_pr0bl3m_0159394921}
Description
Block #11834380 on the Ethereum Blockchain was mined on Febuary 11th at 9:12:59 AM UTC. What is the address of the miner who validated this block? Flag format: flag{0x0000000000000000000000000000000000000000}
Solution
https://etherscan.io/block/11834380
Flag: flag{0xd224ca0c819e8e97ba0136b3b95ceff503b79f53}
Description
The address of my new smart contract is 0xf0674CD7D1C0c616063a786E7d1434340E09BadD, the flag is inside it, and the code is published on Etherscan. Important: This smart contract is on Ropsten
Solution
We start out with the hint of going to Ropsten and viewing the address. One of the entries says readFlag1. Moving over to the contract tab we can see the flag is in the code.
Flag: flag{etherscan_S0urc3_c0de}
Description
I have republished the previous the contract at 0x585C403bC5c7eb62BF3630c7FeF1F837603bA866, but this time no source code for you this time. Luckily, the ABI of the smart contract is the same as the previous one. Figure out how to "get()" the flag. Important: This smart contract is on Ropsten
Solution
First of all, I knew it wasn't going to be like the other problem but still attempted the same route to be disappointed. I then go to internal Txns and click on the link of where it is from. Then seeing that has a contract click on it. Then reading the contract to find the string is the flag.
Flag: flag{web3js_plus_ABI_equalls_flag}
Description
0xe2a9e67bdA26Dd48c8312ea1FE6a7C111e5D7a7A. Important: This smart contract is on Ropsten
Solution
Searching it and looking at the contract all you have to do is go to the code and scroll down to the bottom where the Constructor arguments segment.
Flag: flag{s3t_by_c0nstructor}
Description
Here's the obligatory problem!!!
Solution
Flag:
Description
Infamous YouTuber, and ex-Google / ex-Facebook TechLead found a quick way to make a few million dollars of a crypto scam (as a millionare). He created the ERC-20 token Million (MM), and started promoting it on his social media platforms. The deployer address of the Million token smart contract is the personal address of TechLead, what is the highest historical Ethereum balance of his personal address? Million Token: https://coinmarketcap.com/currencies/million/ Flag format: flag{0.006942069420}
Solution
First going to the website we can find TechLead's address by clicking holders and see the top address. Then analytics chart on that address shows the flag.
https://etherscan.io/address/0x5922b0bbae5182f2b70609f5dfd08f7da561f5a4#analytics
Flag: flag{1.4625790953780384}
Description
The miner of Block #12983883 on the Ethereum Blockchain partakes in the common practice of MEV. What is the exact amount of Ether that was transfered to the miner as a bribe from the transaction that was included first in this block? Info about MEV: https://ethereum.org/en/developers/docs/mev/ Flag format: flag{0.006942069420}
Solution
Start by going to Etherscan and finding the specific block. Then selecting the transactions and the first [last entry] of the transaction should be by a MEV Bot. Selecting the internal Txns we can see the value which is the amount of the taxes.
Flag: flag{0.009672680170055358}
Description
a
Code Given
Solution