pico nice netcat

This one requires you to use the webshell. Remember, when using the webshell, you will need your Pico username and password. Use the Netcat command (nc) given to you in…

pico crackme.py

The crackme.py challenge under Reverse Engineering looks more difficult that it really is. Download the crackme.py code and look over the code. It actually tells you what to use to…

pico Mod26

They give a very good hint here. You can easily find how to solve this one using an obvious web tool.

pico obedient cat

Hmmmm. They give a file to look at. Maybe you can take a Note on what I am saying. You might be able to view this file in a program.

Getting started with Python – Pi My Life Up

https://pimylifeup.com/getting-started-with-python/

Penetration Testing — 100 Terms You Need To Know | by Manish Shivanandhan | Manish Shivanandhan’s Blog | Sep, 2020 | Medium

https://medium.com/manishmshiva/penetration-testing-100-terms-you-need-to-know-a723c38cd8c8

Hacker Name Generators

If you need help coming up with your “hacker” name, try one of these … https://www.fantasynamegenerators.com/hacker-names.php https://codepen.io/robrehrig/full/XbvGMJ https://nickfinder.com/mix-two-names Make sure you do not use inappropriate words / names for class.

PicoCTF Cyber Security Competition

Each year, Lincoln students compete with other students from across the country in Carnegie Mellon University’s picoCTF cyber security competition.

Binary Exploitation – Practice Run 1

You will need the Linux Shell for this. You also will need to know how to use the CD command to change directories and the ./ option to execute the…

Forensics – Garden

A good stegnography file analyzer will help. https://www.secsy.net/easy_stegoCTF