#picoctf-2022
Read more stories on Hashnode
Articles with this tag
Introduction Challenge: File types Category: Forensics Description This file was found among some files marked confidential but my pdf reader cannot...
Introduction Challenge: file-run-2 Category: Reverse Engineering Description: A program has been provided to you, what happens if you try to run it on...
Introduction Challenge: file-run-1 Category: Reverse Engineering Description: A program has been provided to you, what happens if you try to run it on...
Introduction Challenge: Enhance! Category: Forensics Description: Download this image file and find the flag. Download image file Solution Now we...
Introduction Challenge: CVE-XXXX-XXXX Category: Binary Exploitation Description: Enter the CVE of the vulnerability as the flag with the correct flag...
Introduction Challenge: credstuff Category: Cryptography Description: We found a leak of a black-market website's login credentials. Can you find the...