MasterWard Profile
  • Introduction
  • Media Links
  • Resume
  • HackThebox Notes
    • RedPanda
    • Metatwo
  • CTF Contest Writeups
    • 2017
      • Takoma Park CTF
      • TUCTF 2017
      • HITCON CTF 2017 Quals
      • CSAW CTF Qualification Round 2017
      • SEC-T CTF
      • Backdoor CTF 2017
      • Hack Dat Kiwi 2017
      • Kaspersky 2017
      • Hack.lu 2017
      • HackCon 2017
      • Defcamp 2017
      • Square CTF 2017
      • Mitre 2017
      • EKOPARTY CTF 2017
    • 2018
      • SEC-T CTF
      • Hackcon 2018
      • EasyCTF IV 2018
      • DefCamp CTF Qualifiers
      • PACTF 2018
      • CSAW CTF Qualifiers 2018
      • PicoCTF 2018
    • 2019
      • Newark Academy CTF 2019
      • Crypto CTF 2019
      • PicoCTF 2019
        • General Skills
        • Binary Exploitations
        • Forensics
        • Reverse Engineering
        • Cryptography
        • Web Exploitation
      • TAMUctf 19
    • 2021
      • picoCTF 2021
        • General Skills
        • Binary Exploitation
        • Forensics
        • Reverse Engineering
        • Cryptography
        • Web Exploitation
      • HackiHoli
      • S.H.E.L.L CTF
      • DawgCTF 2021
      • TCTF 2021
      • RedPwnCTF 2021
      • IJCTF 2021
      • UIUCTF 2021
      • Really Awesome CTF 2021
      • TMUCTF 2021
      • CSAW Qualifiers 2021
      • Pbjar CTF 2021
      • Deadface CTF 2021
    • 2022
      • NahamCon CTF 2022
      • BYUCTF 2022
      • DEF CON Qualifiers 2022
    • Useful Code
  • Software
    • Video Standardization and Compression
    • TOBIAS
    • Tracking Phone
    • Image Compression
    • Do Not Call Database
    • Color Blind Simulator
    • Gmail Unsubscriber
    • MP4 to GIF Converter
    • Optical Character Reading
    • Soft Jobs
    • OBD Project
    • Online Movie Finder
    • Work In Progress
      • Incremental Backup
      • Web Scraper - Wallpaper Edition
      • Web Blocker
      • File Manipulator
      • AppFiller
      • Cyber Security Projects
      • Bsaber AI
    • Ideas
      • CAN Programming
      • Malicious Programs
      • Remove Yourself from the Internet
      • DNA Classic
      • Auto Clicker
      • Adding Depth to a Video
      • Collage Mosaic Generator
      • Game Destroyer
      • Hearing aid Technology
      • Sign Language Recognition
      • Text Summarizer
      • Video to audio to text
      • Video Object Detection
      • VR demonstration
      • More Ideas to Elaborate on
    • Failure
      • Police Camera Radar
      • Already Created
      • Google Maps Game
      • Car price prediction
      • Bullshit Detector
      • Automated Code writter
      • Career Prediction
      • Samsung Remote Control Hack
      • Invalid Finder
      • PiHole Regex Filter
      • Group Archiver
  • Additional Articles
    • Cleaning Up a Computer Tricks
    • Getting started in Cyber Security
    • Speeding Up Your Internet
    • College Experience
    • Currently Writting
      • Reverse Engineering Notes
      • Bug Bounty Guide and Examples
      • OSCP help
      • Job Experience
      • Professional Job-Hunting Experience
Powered by GitBook
On this page
  • Stonks [20 pts] [Not Solved]
  • Cache Me Outside [70 pts] [Not Solved]
  • Here's a LIBC [90 pts] [Not Solved]
  • Unsubscriptions Are Free [100 pts] [Not Solved]
  • filtered-shellcode [160 pts] [Not Solved]
  • Kit Engine [200 pts] [Not Solved]
  • Stonk Market [250 pts] [Not Solved]
  • Download Horsepower [350 pts] [Not Solved]
  • The Office [400 pts] [Not Solved]
  • Turboflan [450 pts] [Not Solved]
  • Bizz Fuzz [500 pts] [Not Solved]

Was this helpful?

  1. CTF Contest Writeups
  2. 2021
  3. picoCTF 2021

Binary Exploitation

PreviousGeneral SkillsNextForensics

Last updated 3 years ago

Was this helpful?

Stonks [20 pts] [Not Solved]

Description

I decided to try something noone else has before. I made a bot to automatically trade stonks for me using AI and machine learning. I wouldn't believe you if you told me it's unsecure! nc mercury.picoctf.net 59616

Solution

a

Flag:

Cache Me Outside [70 pts] [Not Solved]

Description

While being super relevant with my meme references, I wrote a program to see how much you understand heap allocations. nc mercury.picoctf.net 31153

Solution

a

Flag:

Here's a LIBC [90 pts] [Not Solved]

Description

I am once again asking for you to pwn this binary nc mercury.picoctf.net 1774

Solution

a

Flag:

Unsubscriptions Are Free [100 pts] [Not Solved]

Description

Solution

a

Flag:

filtered-shellcode [160 pts] [Not Solved]

Description

Solution

a

Flag:

Kit Engine [200 pts] [Not Solved]

Description

Solution

a

Flag:

Stonk Market [250 pts] [Not Solved]

Description

Solution

a

Flag:

Download Horsepower [350 pts] [Not Solved]

Description

Solution

a

Flag:

The Office [400 pts] [Not Solved]

Description

Solution

a

Flag:

Turboflan [450 pts] [Not Solved]

Description

Solution

a

Flag:

Bizz Fuzz [500 pts] [Not Solved]

Description

Solution

a

Flag:

Check out my new video-game and spaghetti-eating streaming channel on Twixer! and get a flag. nc mercury.picoctf.net 50361

A program that just runs the code you give it? That seems kinda boring... nc mercury.picoctf.net 26072

Start your engines!! Connect at mercury.picoctf.net 17805

I've learned my lesson, no more reading my API key into memory. Now there's no useful information you can leak! nc mercury.picoctf.net 25462

Gotta go fast Connect at mercury.picoctf.net 32364

I'm tired of having to secure my data on the heap, so I decided to implement my own version of malloc with canaries. It's 10x more secure and only 100x slower! nc mercury.picoctf.net 45725

A Radiant Gourmet Flan told our young Turboflan hero to stop rushing and slow down. Has he listened? Connect at mercury.picoctf.net 23694

FizzBuzz was too easy, so I made something a little bit harder... There's a buffer overflow in this problem, good luck finding it! nc mercury.picoctf.net 22210

vuln.c
heapedit
Makefile
libc.so.6
vuln
libc.so.6
Makefile
program
source
fun
d8
source.tar.gz
server.py
vuln
vuln.c
Makefile
d8
source.tar.gz
server.py
the_office
d8
source.tar.gz
server.py
vuln