This one seemed easy, then turned out to be more difficult than originally thought. Most people were looking for the flag in the image properties and information. However, most people…
Tag: #pico2021
pico Speeds and Feeds
This is is easy to overlook even if you get the code from the hint. First step, take a look at the hint. This is where doing some research on…
pico Wireshark doo do dooo do
This one is a bit more challenging and can be tedious for those who have not used Wireshark. Download the pcap file. Open Wireshark from the C:\APPS\CTF\NETWORKING folder on your…
pico Tab Tab Attack
This required me to unzip the file. Get to the final file and use the Open With option. The program to open this is bintext app in the following folder…
pico nice netcat
This one requires you to use the webshell. Remember, when using the webshell, you will need your Pico username and password. Use the Netcat command (nc) given to you in…
pico crackme.py
The crackme.py challenge under Reverse Engineering looks more difficult that it really is. Download the crackme.py code and look over the code. It actually tells you what to use to…
pico Mod26
They give a very good hint here. You can easily find how to solve this one using an obvious web tool.
pico obedient cat
Hmmmm. They give a file to look at. Maybe you can take a Note on what I am saying. You might be able to view this file in a program.