PicoCTF 2022 Writeup Repository
Binary Exploitation
Challenges | Points |
---|---|
CVE-XXXX-XXXX | 100 |
Basic File Exploit | 100 |
BufferOverflow 0 | 100 |
BufferOverflow 1 | 200 |
Cryptography
Challenges | Points |
---|---|
Basic Mod1 | 100 |
Basic Mod2 | 100 |
Credstuff | 100 |
Morse Code | 100 |
Rail Fence | 100 |
Substitution 0 | 100 |
Substitution 1 | 100 |
Substitution 2 | 100 |
Sum-O-Primes | 400 |
Transposition Trial | 100 |
Very Smooth | 300 |
Vigenere | 100 |
Forensics
Challenges | Points |
---|---|
Eavesdrop | 300 |
Enhance | 100 |
File Types | 100 |
Lookey Here | 100 |
Operation Oni | 300 |
Operation Orchid | 400 |
Packets Primer | 100 |
Redaction Gone Wrong | 100 |
Sleuthkit Apprentice | 200 |
Sleuthkit Intro | 100 |
St3g0 | 300 |
Reverse Engineering
Challenges | Points |
---|---|
Bloat.Py | 200 |
File Run1 | 100 |
File Run2 | 100 |
Fresh Java | 200 |
GDB Test Drive | 100 |
Patchme.py | 100 |
Safe Opener | 100 |
Unpackme.py | 100 |
Web Exploitation
Challenges | Points |
---|---|
Forbidden Paths | 200 |
Includes | 100 |
Inspect HTML | 100 |
Local Authority | 100 |
Power Cookie | 200 |
Roboto Sans | 200 |
Search Source | 100 |
Secrets | 200 |
SQL Direct | 200 |
SQLiLite | 300 |