image-20230327161915650

web

findme

访问页面,是一个登录的页面,账号密码test/test!

抓包看到跳转到一个页面,

(/images/2023picoctf/image-20230327162639364.png)

image-20230327162802078

访问这个/next-page/id=cGljb0NURntwcm94aWVzX2Fs

image-20230327162857583

抓包,中间又会跳转一个页面,直接跳出来一个页面,看到有一个id,好像是base64,直接拼接

image-20230327164821310

flag:picoCTF{proxies_all_the_way_a0fe074f}

chrono

How to automate tasks to run at intervals on linux servers?

机翻:如何自动执行任务以在 Linux 服务器上定期运行?

给了账号密码端口,直接连上去

定时任务的命令 crontab ,执行crontab -l 发现没有,crontab的文件目录在/etc/下 以cron开头,

image-20230327165914627

在 challenge目录下也有flag

image-20230327170454662

flag:{“flag”: “picoCTF{Sch3DUL7NG_T45K3_L1NUX_1d781160}”, “username”: “picoplayer”, “password”: “dd4yT2bR

hideme

Every file gets a flag.
The SOC analyst saw one image been sent back and forth between two people. They decided to investigate and found out that there was more than what

机翻一下:每个文件都有一个标志。
SOC 分析师看到一张图像在两个人之间来回发送。 他们决定展开调查,发现事情远不止于此

直接下载一张图片

foremost 有一个zip包

image-20230327173305594

image-20230327173324858

ristretto flag.png

image-20230327173335655

flag:pIcoCTF{Hiddinng_An_imag3_within_@n_ima9e_96539bea}

MatchTheRegex

正则匹配

输入框输入东西,

image-20230327204642026

p开头 F结尾

^n 匹配任何开头为 n 的字符串。

image-20230327204620651

flag:picoCTF{succ3ssfully_matchtheregex_0694f25b}

SOAP

money-ware

Flag format: picoCTF{Malwarename}The first letter of the malware name should be capitalized and the rest lowercase.Your friend just got hacked and has been asked to pay some bitcoins to 1Mz7153HMuxXTuR2R1t78mGSdzaAtNbBWX. He doesn’t seem to understand what is going on and asks you for advice. Can you identify what malware he’s being a victim of?

标记格式:picoCTF{Malwarename}
恶意软件名称的首字母应大写,其余字母小写。
您的朋友刚刚被黑客入侵,并被要求向 1Mz7153HMuxXTuR2R1t78mGSdzaAtNbBWX 支付一些比特币。 他似乎不明白发生了什么,并向你征求意见。 你能确定他是哪种恶意软件的受害者吗?

image-20230327222153657

flag:picoCTF{Petya}

repetitions

下载文件,拖到ida

image-20230327224136231

base64 多解几次

image-20230327224302506

flag:picoCTF{base64_n3st3d_dic0d!n8_d0wnl04d3d_9b59b35c}

rule

image-20230327224727627

flag:picoCTF{h34rd_und3r5700d_4ck_cba1c711}

FindAndOpen

下载pacp包,中间有个base解一下

这个是下面压缩包的密码

再解一下,就可以了

image-20230328162924061

picoCTF{R34DING_LOKd_fil56_succ3ss_419835ef}

Reverse

reverse

直接拖到ida里

safe opener2

直接拖到ida

timer

拖到Androidkill里

找到buildconfig文件即可

image-20230328205729022

flag:picoCTF{t1m3r_r3v3rs3d_succ355fully_17496}