PicoCTF 2024
by not_a_30t - Wednesday March 13, 2024 at 12:11 PM
#61
I would like to know if there's any hint for flag printer. It is such a large parameter. I cannot think of any fast solution. I wonder if I am required to know any special mathematical concept. I only know the process is trying to do polynomial interpolation but I cannot solve it fast.
Reply
#62
Could someone help me in those? C3, format string 2 & 3, heap 3 and WinAntiDbg0x300?
Reply
#63
(Mar 23, 2024, 04:50 PM)h60am Wrote:
(Mar 23, 2024, 04:36 PM)Gasmo12706 Wrote:
(Mar 22, 2024, 11:00 AM)r3fkNzEU Wrote:
(Mar 22, 2024, 08:36 AM)zzzubxirrr Wrote:
(Mar 22, 2024, 06:49 AM)r3fkNzEU Wrote: Anyone have a tiny hint for "Dear Diary"? I feel like I'm very close, but I don't know if I'm in a rabbit hole, or close to the ending.

You can use autopsy for dear diary and use .txt in search

ive done dear diary , I can help provided if you could also help me, with sansalpha or endianness-v2

I can help you with endianness-v2 if you help me with "Dear Diary"

(Mar 23, 2024, 04:16 PM)h60am Wrote: I agree with the poster above. I think the trading is stupid. Anyone wanna publicly give me a hint in RSA-Oracle? I don't know what I am doing wrong.

I can give a hint for SansAlpha. /???/????64 is base64, and prints the output in base64. But! The command is 1/3 that matches the /???/????64 search, so you have to select the first binary (in a variable).
The flag is located at */????.???

Feel free to ask more questions. I have completed all forensics and general skills.

I found where flag.txt is using ./*/* but how do I get the output from the file?

Use the base64 function as a print. But since the wildcards yield 3 different binaries, you have to select the first one, which is base64. To do this, store it in a list: _420 = (/???/????64). Then, select the first element: "${_420[0]}". Now you can run the base64 command. Run it on the file and you have the flag.

Thanks! You are the GOAT!

I've started working on the other categories now that general and forensics are done, will let you know if I find anything on rsa_oracle
Reply
#64
(Mar 23, 2024, 05:03 PM)vainity Wrote: I would like to know if there's any hint for flag printer. It is such a large parameter. I cannot think of any fast solution. I wonder if I am required to know any special mathematical concept. I only know the process is trying to do polynomial interpolation but I cannot solve it fast.

Same over here,  tried to solve flag_printer for over a week now with no luck. PM me if you have any help
Reply
#65
(Mar 24, 2024, 08:40 AM)zivziv Wrote: Could someone help me in those? C3, format string 2 & 3, heap 3 and WinAntiDbg0x300?

C3 is super easy and but has a very dumb ending... first, we know that ciphertext is encoded using convert.py so we need to reverse the convert.py script to get the unencrypted version
Save the result to part2.py and fix any syntax errors
Next we need to pass thru part2 into part2 by doing
cat part2.py | python part2.py
to get our flag (don't worry if it's really short)
Reply
#66
could someone help me with elements?
Reply
#67
(Mar 23, 2024, 04:50 PM)h60am Wrote:
(Mar 23, 2024, 04:36 PM)Gasmo12706 Wrote:
(Mar 22, 2024, 11:00 AM)r3fkNzEU Wrote:
(Mar 22, 2024, 08:36 AM)zzzubxirrr Wrote:
(Mar 22, 2024, 06:49 AM)r3fkNzEU Wrote: Anyone have a tiny hint for "Dear Diary"? I feel like I'm very close, but I don't know if I'm in a rabbit hole, or close to the ending.

You can use autopsy for dear diary and use .txt in search

ive done dear diary , I can help provided if you could also help me, with sansalpha or endianness-v2

I can help you with endianness-v2 if you help me with "Dear Diary"

(Mar 23, 2024, 04:16 PM)h60am Wrote: I agree with the poster above. I think the trading is stupid. Anyone wanna publicly give me a hint in RSA-Oracle? I don't know what I am doing wrong.

I can give a hint for SansAlpha. /???/????64 is base64, and prints the output in base64. But! The command is 1/3 that matches the /???/????64 search, so you have to select the first binary (in a variable).
The flag is located at */????.???

Feel free to ask more questions. I have completed all forensics and general skills.

I found where flag.txt is using ./*/* but how do I get the output from the file?

Use the base64 function as a print. But since the wildcards yield 3 different binaries, you have to select the first one, which is base64. To do this, store it in a list: _420 = (/???/????64). Then, select the first element: "${_420[0]}". Now you can run the base64 command. Run it on the file and you have the flag.

what do you mean by the last part run it on the file and you have the flag?
Reply
#68
Anyone can help with elements? I have rsa_oracle, Dear Diary, SansAlpha, and babygame03
Reply
#69
(Mar 24, 2024, 03:50 PM)alwaysinlobby Wrote:
(Mar 23, 2024, 04:50 PM)h60am Wrote:
(Mar 23, 2024, 04:36 PM)Gasmo12706 Wrote:
(Mar 22, 2024, 11:00 AM)r3fkNzEU Wrote:
(Mar 22, 2024, 08:36 AM)zzzubxirrr Wrote: You can use autopsy for dear diary and use .txt in search

ive done dear diary , I can help provided if you could also help me, with sansalpha or endianness-v2

I can help you with endianness-v2 if you help me with "Dear Diary"

(Mar 23, 2024, 04:16 PM)h60am Wrote: I agree with the poster above. I think the trading is stupid. Anyone wanna publicly give me a hint in RSA-Oracle? I don't know what I am doing wrong.

I can give a hint for SansAlpha. /???/????64 is base64, and prints the output in base64. But! The command is 1/3 that matches the /???/????64 search, so you have to select the first binary (in a variable).
The flag is located at */????.???

Feel free to ask more questions. I have completed all forensics and general skills.

I found where flag.txt is using ./*/* but how do I get the output from the file?

Use the base64 function as a print. But since the wildcards yield 3 different binaries, you have to select the first one, which is base64. To do this, store it in a list: _420 = (/???/????64). Then, select the first element: "${_420[0]}". Now you can run the base64 command. Run it on the file and you have the flag.

what do you mean by the last part run it on the file and you have the flag?

Like this:

SansAlpha$ _420=(/???/????64)

SansAlpha$ "${_420[0]}" */????.???
Reply
#70
does anyone have a picoctf account that's registered for pico 2024 that i can use?
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] CPTS 12 FLAGS pulsebreaker 73 2,317 2 hours ago
Last Post: louikizzz
  [MEGALEAK] HackTheBox ProLabs, Fortress, Endgame - Alchemy, 250 Flags, leak htb-bot htb-bot 89 8,091 2 hours ago
Last Post: Xploitd
Heart [FREE] HackTheBox All Cheatsheets Tamarisk 10 622 6 hours ago
Last Post: chufoni
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 28 2,847 6 hours ago
Last Post: chufoni
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 375 93,589 6 hours ago
Last Post: Johe

Forum Jump:


 Users browsing this forum: 1 Guest(s)