MasterWard Profile
  • Introduction
  • Media Links
  • Resume
  • HackThebox Notes
    • RedPanda
    • Metatwo
  • CTF Contest Writeups
    • 2017
      • Takoma Park CTF
      • TUCTF 2017
      • HITCON CTF 2017 Quals
      • CSAW CTF Qualification Round 2017
      • SEC-T CTF
      • Backdoor CTF 2017
      • Hack Dat Kiwi 2017
      • Kaspersky 2017
      • Hack.lu 2017
      • HackCon 2017
      • Defcamp 2017
      • Square CTF 2017
      • Mitre 2017
      • EKOPARTY CTF 2017
    • 2018
      • SEC-T CTF
      • Hackcon 2018
      • EasyCTF IV 2018
      • DefCamp CTF Qualifiers
      • PACTF 2018
      • CSAW CTF Qualifiers 2018
      • PicoCTF 2018
    • 2019
      • Newark Academy CTF 2019
      • Crypto CTF 2019
      • PicoCTF 2019
        • General Skills
        • Binary Exploitations
        • Forensics
        • Reverse Engineering
        • Cryptography
        • Web Exploitation
      • TAMUctf 19
    • 2021
      • picoCTF 2021
        • General Skills
        • Binary Exploitation
        • Forensics
        • Reverse Engineering
        • Cryptography
        • Web Exploitation
      • HackiHoli
      • S.H.E.L.L CTF
      • DawgCTF 2021
      • TCTF 2021
      • RedPwnCTF 2021
      • IJCTF 2021
      • UIUCTF 2021
      • Really Awesome CTF 2021
      • TMUCTF 2021
      • CSAW Qualifiers 2021
      • Pbjar CTF 2021
      • Deadface CTF 2021
    • 2022
      • NahamCon CTF 2022
      • BYUCTF 2022
      • DEF CON Qualifiers 2022
    • Useful Code
  • Software
    • Video Standardization and Compression
    • TOBIAS
    • Tracking Phone
    • Image Compression
    • Do Not Call Database
    • Color Blind Simulator
    • Gmail Unsubscriber
    • MP4 to GIF Converter
    • Optical Character Reading
    • Soft Jobs
    • OBD Project
    • Online Movie Finder
    • Work In Progress
      • Incremental Backup
      • Web Scraper - Wallpaper Edition
      • Web Blocker
      • File Manipulator
      • AppFiller
      • Cyber Security Projects
      • Bsaber AI
    • Ideas
      • CAN Programming
      • Malicious Programs
      • Remove Yourself from the Internet
      • DNA Classic
      • Auto Clicker
      • Adding Depth to a Video
      • Collage Mosaic Generator
      • Game Destroyer
      • Hearing aid Technology
      • Sign Language Recognition
      • Text Summarizer
      • Video to audio to text
      • Video Object Detection
      • VR demonstration
      • More Ideas to Elaborate on
    • Failure
      • Police Camera Radar
      • Already Created
      • Google Maps Game
      • Car price prediction
      • Bullshit Detector
      • Automated Code writter
      • Career Prediction
      • Samsung Remote Control Hack
      • Invalid Finder
      • PiHole Regex Filter
      • Group Archiver
  • Additional Articles
    • Cleaning Up a Computer Tricks
    • Getting started in Cyber Security
    • Speeding Up Your Internet
    • College Experience
    • Currently Writting
      • Reverse Engineering Notes
      • Bug Bounty Guide and Examples
      • OSCP help
      • Job Experience
      • Professional Job-Hunting Experience
Powered by GitBook
On this page
  • Polymer
  • Miner
  • readFlag1
  • readFlag2
  • readFlag3
  • ReallynotSecureAlgorithm
  • TechLead
  • MEV
  • Not Baby

Was this helpful?

  1. CTF Contest Writeups
  2. 2021

Pbjar CTF 2021

PreviousCSAW Qualifiers 2021NextDeadface CTF 2021

Last updated 3 years ago

Was this helpful?

Polymer

Description

I learned in my biology class that a polymer is a chain of monomers that can sometimes form long strings of molecules.

Solution

So doing a strings polymer | grep flag{ > outs.txt give 425 lines with a lot of flag{n0t_th3_fl4g_l0l} Replacing the fake flag with space and running strings outs.txt > | grep flag{ mr. i'll ask you what the real flag is flag{ju5t_4n0th3r_str1ng5_pr0bl3m_0159394921} think we'd all like to know.

Flag: flag{ju5t_4n0th3r_str1ng5_pr0bl3m_0159394921}

Miner

Description

Block #11834380 on the Ethereum Blockchain was mined on Febuary 11th at 9:12:59 AM UTC. What is the address of the miner who validated this block? Flag format: flag{0x0000000000000000000000000000000000000000}

Solution

Flag: flag{0xd224ca0c819e8e97ba0136b3b95ceff503b79f53}

readFlag1

Description

The address of my new smart contract is 0xf0674CD7D1C0c616063a786E7d1434340E09BadD, the flag is inside it, and the code is published on Etherscan. Important: This smart contract is on Ropsten

Solution

Flag: flag{etherscan_S0urc3_c0de}

readFlag2

Description

I have republished the previous the contract at 0x585C403bC5c7eb62BF3630c7FeF1F837603bA866, but this time no source code for you this time. Luckily, the ABI of the smart contract is the same as the previous one. Figure out how to "get()" the flag. Important: This smart contract is on Ropsten

Solution

Flag: flag{web3js_plus_ABI_equalls_flag}

readFlag3

Description

0xe2a9e67bdA26Dd48c8312ea1FE6a7C111e5D7a7A. Important: This smart contract is on Ropsten

Solution

Flag: flag{s3t_by_c0nstructor}

ReallynotSecureAlgorithm

Description

Here's the obligatory problem!!!

Solution

Flag:

TechLead

Description

Solution

First going to the website we can find TechLead's address by clicking holders and see the top address. Then analytics chart on that address shows the flag.

Flag: flag{1.4625790953780384}

MEV

Description

Solution

Flag: flag{0.009672680170055358}

Not Baby

Description

a

Code Given

from Crypto.Util.number import *

with open('flag.txt','rb') as g:
    flag = g.read().strip()

with open('nums.txt','r') as f:
	s=f.read().strip().split()
	a=int(s[0])
	b=int(s[1])
	c=int(s[2])


e=65537
n=a**3+b**3-34*c**3
m=bytes_to_long(flag)
ct=pow(m,e,n)

print ("n: ",n)
print ("e: ",e)
print ("ct: ",ct)

Solution

We start out with the hint of going to Ropsten and viewing the . One of the entries says readFlag1. Moving over to the tab we can see the flag is in the code.

First of all, I knew it wasn't going to be like the other problem but still attempted the same route to be disappointed. I then go to and click on the link of where it is from. Then seeing that has a contract click on it. Then to find the string is the flag.

Searching it and looking at the all you have to do is go to the code and scroll down to the bottom where the Constructor arguments segment.

Infamous YouTuber, and ex-Google / ex-Facebook TechLead found a quick way to make a few million dollars of a crypto scam (as a millionare). He created the ERC-20 token Million (MM), and started promoting it on his social media platforms. The deployer address of the Million token smart contract is the personal address of TechLead, what is the highest historical Ethereum balance of his personal address? Million Token: Flag format: flag{0.006942069420}

The miner of Block #12983883 on the Ethereum Blockchain partakes in the common practice of MEV. What is the exact amount of Ether that was transfered to the miner as a bribe from the transaction that was included first in this block? Info about MEV: Flag format: flag{0.006942069420}

Start by going to Etherscan and finding the specific . Then selecting the transactions and the first [last entry] of the transaction should be by a MEV Bot. Selecting the we can see the value which is the amount of the taxes.

address
contract
internal Txns
reading the contract
contract
https://coinmarketcap.com/currencies/million/
https://etherscan.io/address/0x5922b0bbae5182f2b70609f5dfd08f7da561f5a4#analytics
https://ethereum.org/en/developers/docs/mev/
block
internal Txns
https://etherscan.io/block/11834380
32KB
polymer.zip
archive