MasterWard Profile
  • Introduction
  • Media Links
  • Resume
  • HackThebox Notes
    • RedPanda
    • Metatwo
  • CTF Contest Writeups
    • 2017
      • Takoma Park CTF
      • TUCTF 2017
      • HITCON CTF 2017 Quals
      • CSAW CTF Qualification Round 2017
      • SEC-T CTF
      • Backdoor CTF 2017
      • Hack Dat Kiwi 2017
      • Kaspersky 2017
      • Hack.lu 2017
      • HackCon 2017
      • Defcamp 2017
      • Square CTF 2017
      • Mitre 2017
      • EKOPARTY CTF 2017
    • 2018
      • SEC-T CTF
      • Hackcon 2018
      • EasyCTF IV 2018
      • DefCamp CTF Qualifiers
      • PACTF 2018
      • CSAW CTF Qualifiers 2018
      • PicoCTF 2018
    • 2019
      • Newark Academy CTF 2019
      • Crypto CTF 2019
      • PicoCTF 2019
        • General Skills
        • Binary Exploitations
        • Forensics
        • Reverse Engineering
        • Cryptography
        • Web Exploitation
      • TAMUctf 19
    • 2021
      • picoCTF 2021
        • General Skills
        • Binary Exploitation
        • Forensics
        • Reverse Engineering
        • Cryptography
        • Web Exploitation
      • HackiHoli
      • S.H.E.L.L CTF
      • DawgCTF 2021
      • TCTF 2021
      • RedPwnCTF 2021
      • IJCTF 2021
      • UIUCTF 2021
      • Really Awesome CTF 2021
      • TMUCTF 2021
      • CSAW Qualifiers 2021
      • Pbjar CTF 2021
      • Deadface CTF 2021
    • 2022
      • NahamCon CTF 2022
      • BYUCTF 2022
      • DEF CON Qualifiers 2022
    • Useful Code
  • Software
    • Video Standardization and Compression
    • TOBIAS
    • Tracking Phone
    • Image Compression
    • Do Not Call Database
    • Color Blind Simulator
    • Gmail Unsubscriber
    • MP4 to GIF Converter
    • Optical Character Reading
    • Soft Jobs
    • OBD Project
    • Online Movie Finder
    • Work In Progress
      • Incremental Backup
      • Web Scraper - Wallpaper Edition
      • Web Blocker
      • File Manipulator
      • AppFiller
      • Cyber Security Projects
      • Bsaber AI
    • Ideas
      • CAN Programming
      • Malicious Programs
      • Remove Yourself from the Internet
      • DNA Classic
      • Auto Clicker
      • Adding Depth to a Video
      • Collage Mosaic Generator
      • Game Destroyer
      • Hearing aid Technology
      • Sign Language Recognition
      • Text Summarizer
      • Video to audio to text
      • Video Object Detection
      • VR demonstration
      • More Ideas to Elaborate on
    • Failure
      • Police Camera Radar
      • Already Created
      • Google Maps Game
      • Car price prediction
      • Bullshit Detector
      • Automated Code writter
      • Career Prediction
      • Samsung Remote Control Hack
      • Invalid Finder
      • PiHole Regex Filter
      • Group Archiver
  • Additional Articles
    • Cleaning Up a Computer Tricks
    • Getting started in Cyber Security
    • Speeding Up Your Internet
    • College Experience
    • Currently Writting
      • Reverse Engineering Notes
      • Bug Bounty Guide and Examples
      • OSCP help
      • Job Experience
      • Professional Job-Hunting Experience
Powered by GitBook
On this page
  • Transformation [20 pts] [Not Solved]
  • keygenme-py [30 pts] [Not Solved]
  • crackme-py [30 pts]
  • ARMssembly 0 [40 pts] [Not Solved]
  • speeds and feeds [50 pts] [Not Solved]
  • Shop [50 pts] [Not Solved]
  • ARMssembly 1 [70 pts] [Not Solved]
  • ARMssembly 2 [90 pts] [Not Solved]
  • Hurry up! Wait ! [100 pts] [Not Solved]
  • gogo [110 pts] [Not Solved]
  • ARMssembly 3 [130 pts] [Not Solved]
  • Let's get dynamic [150 pts] [Not Solved]
  • Easy as GDB [160 pts] [Not Solved]
  • ARMssembly 4 [170 pts] [Not Solved]
  • Powershelly [180 pts] [Not Solved]
  • Rolling My Own [300 pts] [Not Solved]
  • Checkpass [375 pts] [Not Solved]

Was this helpful?

  1. CTF Contest Writeups
  2. 2021
  3. picoCTF 2021

Reverse Engineering

PreviousForensicsNextCryptography

Last updated 3 years ago

Was this helpful?

Transformation [20 pts] [Not Solved]

Description

I wonder what this really is... ''.join([chr((ord(flag[i]) << 8) + ord(flag[i + 1])) for i in range(0, len(flag), 2)])

Solution

a

Flag:

keygenme-py [30 pts] [Not Solved]

Description

Solution

a

Flag:

crackme-py [30 pts]

Description

Solution

So opening up the code I noticed that their are two functions, but when ran only 1 is called. I added only 1 line of code that would print out the flag.

decode_secret(bezos_cc_secret)

Flag: picoCTF{1|\/|_4_p34||ut_8c551048}

ARMssembly 0 [40 pts] [Not Solved]

Description

Solution

a

Flag:

speeds and feeds [50 pts] [Not Solved]

Description

There is something on my shop network running at nc mercury.picoctf.net 28067, but I can't tell what it is. Can you?

Solution

a

Flag:

Shop [50 pts] [Not Solved]

Description

Solution

a

Flag:

ARMssembly 1 [70 pts] [Not Solved]

Description

Solution

a

Flag:

ARMssembly 2 [90 pts] [Not Solved]

Description

Solution

a

Flag:

Hurry up! Wait ! [100 pts] [Not Solved]

Description

Solution

a

Flag:

gogo [110 pts] [Not Solved]

Description

Solution

a

Flag:

ARMssembly 3 [130 pts] [Not Solved]

Description

Solution

a

Flag:

Let's get dynamic [150 pts] [Not Solved]

Description

Solution

a

Flag:

Easy as GDB [160 pts] [Not Solved]

Description

Solution

a

Flag:

ARMssembly 4 [170 pts] [Not Solved]

Description

Solution

a

Flag:

Powershelly [180 pts] [Not Solved]

Description

Solution

a

Flag:

Rolling My Own [300 pts] [Not Solved]

Description

Solution

a

Flag:

Checkpass [375 pts] [Not Solved]

Description

Solution

a

Flag:

What integer does this program print with arguments 4004594377 and 4110761777? File: Flag format: picoCTF{XXXXXXXX} -> (hex, lowercase, no 0x, and 32 bits. ex. 5614267 would be picoCTF{0055aabb})

Best Stuff - Cheap Stuff, Buy Buy Buy... Store Instance: . The shop is open for business at nc mercury.picoctf.net 3952.

For what argument does this program print `win` with variables 83, 0 and 3? File: Flag format: picoCTF{XXXXXXXX} -> (hex, lowercase, no 0x, and 32 bits. ex. 5614267 would be picoCTF{0055aabb})

What integer does this program print with argument 3297082261? File: Flag format: picoCTF{XXXXXXXX} -> (hex, lowercase, no 0x, and 32 bits. ex. 5614267 would be picoCTF{0055aabb})

Hmmm this is a weird file... . There is a instance of the service running at mercury.picoctf.net:34256.

What integer does this program print with argument 4012702611? File: Flag format: picoCTF{XXXXXXXX} -> (hex, lowercase, no 0x, and 32 bits. ex. 5614267 would be picoCTF{0055aabb})

Can you tell what this file is reading?

The flag has got to be checked somewhere... File:

What integer does this program print with argument 3459413018? File: Flag format: picoCTF{XXXXXXXX} -> (hex, lowercase, no 0x, and 32 bits. ex. 5614267 would be picoCTF{0055aabb})

It's not a bad idea to learn to read Powershell. We give you the output, but do you think you can find the input?

I don't trust password checkers made by other people, so I wrote my own. It doesn't even need to store the password! If you can crack it I'll give you a flag. nc mercury.picoctf.net 47110

What is the password? File: Flag format: picoCTF{...}

enc
keygenme-trial.py
crackme.py
chall.S
source
chall_1.S
chall_2.S
svchost.exe
enter_password
chall_3.S
chall.S
brute
chall_4.S
rev_PS.ps1
output.txt
remote
checkpass