djm89uk

Programming challenges.

PicoCTF

picoCTF hold periodic CTF events and provide a practice CTF environment called picoGym to allow individuals to work on their CTF skills outside of a formal CTF event.

Contents


PicoCTF | Home


PicoGym Web Exploitation (40/45)

Web Exploitation entails the manipulation of websites and web hosted services using vulnerabilities in the interactive elements of a website.

Challenges
  1. Insp3ct0r (2019)
  2. logon (2019)
  3. where are the robots (2019)
  4. dont-use-client-side (2019)
  5. picobrowser (2019)
  6. Client-side-again (2019)
  7. Irish-Name-Repo 1 (2019)
  8. Irish-Name-Repo 2 (2019)
  9. Irish-Name-Repo 3 (2019)
  10. JaWT Scratchpad (2019)
  11. Java Script Kiddie (2019)
  12. Java Script Kiddie 2 (2019)
  13. Web Gauntlet (2020)
  14. GET aHEAD (2021)
  15. Cookies (2021)
  16. Scavenger Hunt (2021)
  17. Some Assembly Required 1 (2021)
  18. More Cookies (2021)
  19. It is my Birthday (2021)
  20. Who are you? (2021)
  21. Some Assembly Required 2 (2021)
  22. Super Serial (2021)
  23. Most Cookies (2021)
  24. Some Assembly Required 3 (2021)
  25. Web Gauntlet 2 (2021)
  26. Some Assembly Required 4 (2021)
  27. X marks the spot (2021)
  28. Web Gauntlet 3 (2021)
  29. Bithug (2021)
  30. login (2021)
  31. caas (2021)
  32. notepad (2021)
  33. JAuth (2021)
  34. Includes (2022)
  35. Inspect HTML (2022)
  36. Local Authority (2022)
  37. Search Source (2022)
  38. Forbidden Paths (2022)
  39. Power Cookie (2022)
  40. Roboto Sans (2022)
  41. Secrets (2022)
  42. SQL Direct (2022)
  43. SQLiLite (2022)
  44. Live Art (2022)
  45. Noted (2022)

PicoCTF | Home


PicoGym Cryptography (46/50)

Cryptography is essential to many models of cyber security. Cryptography applies algorithms to shuffle the bits that represent data in such a way that only authorized users can unshuffle them to obtain the original data.

Challenges
  1. The Numbers (2019)
  2. caesar (2019)
  3. Easy1 (2019)
  4. 13 (2019)
  5. la cifra de (2019)
  6. rsa-pop-quiz (2019)
  7. Tapping (2019)
  8. Mr-Worldwide (2019)
  9. Flags (2019)
  10. waves over lambda (2019)
  11. miniRSA (2019)
  12. b00tl3gRSA2 (2019)
  13. AES-ABC (2019)
  14. b00tl3gRSA3 (2019)
  15. john_pollard (2019)
  16. Mod 26 (2021)
  17. Mind your Ps and Qs (2021)
  18. Easy Peasy (2021)
  19. New Caesar (2021)
  20. Mini RSA (2021)
  21. Dachshund Attacks (2021)
  22. No Padding, No Problem (2021)
  23. Pixelated (2021)
  24. Play Nice (2021)
  25. Double DES (2021)
  26. Compress and Attack (2021)
  27. Scrambled: RSA (2021)
  28. It's Not My Fault 1 (2021)
  29. New Vignere (2021)
  30. Clouds (2021)
  31. Spelling-Quiz (2021)
  32. XtraORdinary (2021)
  33. Triple-Secure (2021)
  34. College-Rowing-Team (2021)
  35. Corrupt-key-1 (2021)
  36. Corrupt-key-2 (2021)
  37. basic-mod1 (2022)
  38. basic-mod2 (2022)
  39. credstuff (2022)
  40. morse-code (2022)
  41. rail-fence (2022)
  42. substitution0 (2022)
  43. substitution1 (2022)
  44. substitution2 (2022)
  45. transposition-trial (2022)
  46. Vigenere (2022)
  47. Very Smooth (2022)
  48. Sequences (2022)
  49. Sum-O-Primes (2022)
  50. NSA Backdoor (2022)

PicoCTF | Home


PicoGym Reverse Engineering (48/55)

Reverse engineering entails taking a software system and analyzing it to trace it back to the original design and implementation information. It is used to fix certain bugs in software as well as to enhance product features in both hardware and software.

Challenges
  1. vault-door-training (2019)
  2. vault-door-1 (2019)
  3. vault-door-3 (2019)
  4. vault-door-4 (2019)
  5. vault-door-5 (2019)
  6. vault-door-6 (2019)
  7. vault-door-7 (2019)
  8. vault-door-8 (2019)
  9. asm1 (2019)
  10. asm2 (2019)
  11. asm3 (2019)
  12. asm4 (2019)
  13. droids0 (2019)
  14. droids1 (2019)
  15. droids2 (2019)
  16. droids3 (2019)
  17. droids4 (2019)
  18. revese_cipher (2019)
  19. Need For Speed (2019)
  20. B1ll_Gat35 (2019)
  21. Forky (2019)
  22. OTP Implementation (2020)
  23. Transformation (2021)
  24. Keygenme-py (2021)
  25. crackme-py (2021)
  26. ARMssembly 0 (2021)
  27. speeds and feeds (2021)
  28. Shop (2021)
  29. ARMssembly 1 (2021)
  30. ARMssembly 2 (2021)
  31. Hurry up! Wait! (2021)
  32. gogo (2021)
  33. ARMssembly 3 (2021)
  34. Let's get dynamic (2021)
  35. Easy as GDB (2021)
  36. ARMssembly 4 (2021)
  37. Powershelly (2021)
  38. Rolling My Own (2021)
  39. Checkpass (2021)
  40. not crypto (2021)
  41. breadth (2021)
  42. riscy business (2021)
  43. MATRIX (2021)
  44. file-run1 (2022)
  45. file-run2 (2022)
  46. GDB Test Drive (2022)
  47. patchme.py (2022)
  48. Safe Opener (2022)
  49. unpackme.py (2022)
  50. bloat.py (2022)
  51. Fresh Java (2022)
  52. Bbbbloat (2022)
  53. unpackme (2022)
  54. Keygenme (2022)
  55. Wizardlike (2022)

PicoCTF | Home


PicoGym Forensics (50/50)

"Forensics" challenges can include file format analysis, steganography, memory dump analysis, or network packet capture analysis.

Challenges
  1. Glory of the Garden (2019)
  2. So Meta (2019)
  3. extensions (2019)
  4. shark on wire 1 (2019)
  5. What Lies Within (2019)
  6. c0rrupt (2019)
  7. WhitePages (2019)
  8. m00nwalk (2019)
  9. like1000 (2019)
  10. shark on wire 2 (2019)
  11. m00nwalk2 (2019)
  12. Investigative Reversing 0 (2019)
  13. WebNet0 (2019)
  14. Investigative Reversing 1 (2019)
  15. Investigative Reversing 2 (2019)
  16. Investigative Reversing 3 (2019)
  17. Investigative Reversing 4 (2019)
  18. investigation_encoded_1 (2019)
  19. WebNet1 (2019)
  20. investigation_encoded_2 (2019)
  21. B1g_Mac (2019)
  22. Pitter, Patter, Platters (2020)
  23. Information (2021)
  24. Matryoshka doll (2021)
  25. tunn3l v1s10n (2021)
  26. Wireshark doo dooo do doo (2021)
  27. MacroHard WeakEdge (2021)
  28. Trivial Flag Transfer Protocol (2021)
  29. Wireshark twoo twooo two twoo (2021)
  30. Disk, disk, sleuth! (2021)
  31. Milkslap (2021)
  32. Disk,disk, sleauth II (2021)
  33. Surfing the Waves (2021)
  34. Very very very Hidden (2021)
  35. Advanced-potion-making (2021)
  36. Scrambled-bytes (2021)
  37. WPA-ing Out
  38. Enhance! (2022)
  39. File Types (2022)
  40. Lookey Here (2022)
  41. Packets Primer (2022)
  42. Redaction Gone Wrong (2022)
  43. Sleuthkit Intro (2022)
  44. Sleuthkit Apprentice (2022)
  45. Eavesdrop (2022)
  46. Operation Oni (2022)
  47. St3g0 (2022)
  48. Operation Orchid (2022)
  49. Sidechannel (2022)
  50. Torrent Analyze (2022)

PicoCTF | Home


PicoGym General Skills (34/34)

Challenges
  1. 2Warm (2019)
  2. Warmed Up (2019)
  3. Lets Warm Up (2019)
  4. strings it (2019)
  5. Bases (2019)
  6. First Grep (2019)
  7. what's a net cat? (2019)
  8. plumbing (2019)
  9. Based (2019)
  10. flag_shop (2019)
  11. mus1c (2019)
  12. 1_wanna_b3_a_r0ck5tar (2019)
  13. Obedient cat (2021)
  14. Python Wrangling (2021)
  15. Wave a flag (2021)
  16. Nice netcat (2021)
  17. Static aint always noise (2021)
  18. Tab Tab Attack (2021)
  19. Magikarp Ground Mission (2021)
  20. Codebook
  21. convertme.py
  22. fixme1.py
  23. fixme2.py
  24. Glitch Cat
  25. HashingJobApp
  26. PW Crack 1
  27. PW Crack 2
  28. PW Crack 3
  29. PW Crack 4
  30. PW Crack 5
  31. runme.py
  32. Serpentine
  33. First Find
  34. Big Zip

PicoCTF | Home


PicoGym Binary Exploitation (13/37)

Binary exploitation is the process of subverting a compiled application such that it violates some trust boundary in a way that is advantageous to you, the attacker.

Challenges
  1. seed-sPRiNG (2019) 🗸
  2. sice_cream (2019)
  3. zero_to_hero (2019)
  4. messy-malloc (2019)
  5. Guessing Game 1 (2020) 🗸
  6. Guessing Game 2 (2020)
  7. Stonks (2021) 🗸
  8. Cache Me Outside (2021)
  9. Here's a LIBC (2021)
  10. Unsubscriptions Are Free (2021)
  11. filtered-shellcode (2021)
  12. Kit Engine (2021)
  13. Stonk Market (2021)
  14. Download Horsepower (2021)
  15. The Office (2021)
  16. Turboflan (2021)
  17. Bizz Fuzz (2021)
  18. cutter-overflow (2021) 🗸
  19. fermat-strings (2021)
  20. SaaS (2021)
  21. homework (2021)
  22. lockdown-horses (2021)
  23. vr-school (2021)
  24. basic-file-exploit (2022) 🗸
  25. buffer overflow 0 (2022) 🗸
  26. CVE-XXXX-XXXX (2022) 🗸
  27. buffer overflow 1 (2022) 🗸
  28. RPS (2022) 🗸
  29. x-sixty-what (2022) 🗸
  30. buffer overflow 2 (2022) 🗸
  31. buffer overflow 3 (2022) 🗸
  32. flag leak (2022) 🗸
  33. ropfu (2022)
  34. wine (2022)
  35. function overwrite (2022)
  36. stack cache (2022)
  37. solfire (2022)

PicoCTF | Home


This page was last updated May 22.

djm89uk homepage