PicoCTF Cyber Security Competition

Each year, Lincoln students compete with other students from across the country in Carnegie Mellon University’s picoCTF cyber security competition.

Binary Exploitation – Practice Run 1

You will need the Linux Shell for this. You also will need to know how to use the CD command to change directories and the ./ option to execute the…

Forensics – Garden

A good stegnography file analyzer will help. https://www.secsy.net/easy_stegoCTF

Cryptography – Tapping

Hmmm. Not sure if this code is still used. Some may know this code from either sounds or light flashes.


This is a compressed file. Unfortunately, you cannot use the extract function of Windows to uncompress this like you would to a “zipped” file. Perhaps something like 7zip might work…

Forensics – Shark on a Wire

The seems to be a play on words for Wireshark. Perhaps there is such a tool on your computers.

Reverse Engineering – Vault Door Training

One big security risk is having passwords readily available in the source code of apps.

Cryptography – Easy 1

This one seemed a little difficult. You need to pay attention to the type of “key” that they provide. It is not a word or numbers. Which type of cipher…

Forensics – What lies within

To solve this one, you need a proper understanding of Steganography. Here is some information on it … Steganography is the technique of hiding secret data within an ordinary, non-secret,…

Forensics – Extensions

File Extensions are used by most operating systems to determine what kind of file the computer is looking at. Unfortunately, sometimes a file is named with the wrong extension at…