Pbjar CTF 2021
Last updated
Was this helpful?
Last updated
Was this helpful?
Description
I learned in my biology class that a polymer is a chain of monomers that can sometimes form long strings of molecules.
Solution
So doing a strings polymer | grep flag{ > outs.txt
give 425 lines with a lot of flag{n0t_th3_fl4g_l0l}
Replacing the fake flag with space and running strings outs.txt > | grep flag{
mr. i'll ask you what the real flag is flag{ju5t_4n0th3r_str1ng5_pr0bl3m_0159394921} think we'd all like to know.
Flag: flag{ju5t_4n0th3r_str1ng5_pr0bl3m_0159394921}
Description
Block #11834380 on the Ethereum Blockchain was mined on Febuary 11th at 9:12:59 AM UTC. What is the address of the miner who validated this block? Flag format: flag{0x0000000000000000000000000000000000000000}
Solution
Flag: flag{0xd224ca0c819e8e97ba0136b3b95ceff503b79f53}
Description
The address of my new smart contract is 0xf0674CD7D1C0c616063a786E7d1434340E09BadD, the flag is inside it, and the code is published on Etherscan. Important: This smart contract is on Ropsten
Solution
Flag: flag{etherscan_S0urc3_c0de}
Description
I have republished the previous the contract at 0x585C403bC5c7eb62BF3630c7FeF1F837603bA866, but this time no source code for you this time. Luckily, the ABI of the smart contract is the same as the previous one. Figure out how to "get()" the flag. Important: This smart contract is on Ropsten
Solution
Flag: flag{web3js_plus_ABI_equalls_flag}
Description
0xe2a9e67bdA26Dd48c8312ea1FE6a7C111e5D7a7A. Important: This smart contract is on Ropsten
Solution
Flag: flag{s3t_by_c0nstructor}
Description
Here's the obligatory problem!!!
Solution
Flag:
Description
Solution
First going to the website we can find TechLead's address by clicking holders and see the top address. Then analytics chart on that address shows the flag.
Flag: flag{1.4625790953780384}
Description
Solution
Flag: flag{0.009672680170055358}
Description
a
Code Given
Solution
We start out with the hint of going to Ropsten and viewing the . One of the entries says readFlag1. Moving over to the tab we can see the flag is in the code.
First of all, I knew it wasn't going to be like the other problem but still attempted the same route to be disappointed. I then go to and click on the link of where it is from. Then seeing that has a contract click on it. Then to find the string is the flag.
Searching it and looking at the all you have to do is go to the code and scroll down to the bottom where the Constructor arguments segment.
Infamous YouTuber, and ex-Google / ex-Facebook TechLead found a quick way to make a few million dollars of a crypto scam (as a millionare). He created the ERC-20 token Million (MM), and started promoting it on his social media platforms. The deployer address of the Million token smart contract is the personal address of TechLead, what is the highest historical Ethereum balance of his personal address? Million Token: Flag format: flag{0.006942069420}
The miner of Block #12983883 on the Ethereum Blockchain partakes in the common practice of MEV. What is the exact amount of Ether that was transfered to the miner as a bribe from the transaction that was included first in this block? Info about MEV: Flag format: flag{0.006942069420}
Start by going to Etherscan and finding the specific . Then selecting the transactions and the first [last entry] of the transaction should be by a MEV Bot. Selecting the we can see the value which is the amount of the taxes.