One big security risk is having passwords readily available in the source code of apps.
Category: CTF
Capture The Flag and Other Security Competitions
Cryptography – Easy 1
This one seemed a little difficult. You need to pay attention to the type of “key” that they provide. It is not a word or numbers. Which type of cipher…
Forensics – What lies within
To solve this one, you need a proper understanding of Steganography. Here is some information on it … Steganography is the technique of hiding secret data within an ordinary, non-secret,…
Forensics – Extensions
File Extensions are used by most operating systems to determine what kind of file the computer is looking at. Unfortunately, sometimes a file is named with the wrong extension at…
Forensics – So Meta
There are quite a few online tools to help with this one. It helps to know what Meta Data is. Jeff knows what Meta Data is.
General Skills – Based
You must quickly convert several base #s to Text. It helps to be quick with copy & paste and to have the appropriate conversion tools already open in tabs.
Cryptography – Flags
Each flag picture means something. Be careful when searching. I hear that there are rough seas ahead.
Cryptography – Caesar
These might seem cryptic, but there are plenty of options for decoding this online.
Cryptography – Easy1
The creators of PicoCTF would prefer that you create a script within the shell to convert, but you should be able to find several decoders online.
Cryptography – Numbers
This is the most simple code that kids learn. If you get stuck, look at the hint provided in PICOCTF