picoCTF 2019


CTF Archive

Welcome to picoCTF

True to all picoCTF's before it, picoCTF 2019 excelled at providing helpful learning ramps for people investigating cyber security for the first time, but also provided some difficult challenges to test the saltiest cyber security expert's chops.

The video game aspect of picoCTF 2019 was incredibly well-received and besides a lit soundtrack, it provided mini-games that could unlock super-hints for a handful of challenges.

picoCTF 2019 improved upon the Classroom feature from the previous year, allowing instructors to create up to 20 classrooms and add students quickly using batch registration via a comma separated values file.


Original Date: Fri, 27 Sept. 2019, 12:00 UTC — Fri, 11 Oct. 2019, 12:00 UTC
Original URL: https://2019game.picoctf.com/
CTFtime Entry: picoCTF 2019
Organizing Team: M^-4


Challenges

Can you take advantage of misused malloc calls to leak the secret through this service and get the flag?

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: M^-4

Now you’re really cooking. Can you pwn this service?

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: CLAUDE

Just pwn this program and get a flag.

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: SAMUEL

This vault uses for-loops and byte arrays. The source code for this vault is here: VaultDoor3.java

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: MARK E. HAASE

What does asm1(0x1f3) return? Submit the flag as a hexadecimal value (starting with '0x'). NOTE: Your submission for this question will NOT be in the normal flag format.

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: Sanjay C

What does asm2(0xc,0x15) return? Submit the flag as a hexadecimal value (starting with '0x'). NOTE: Your submission for this question will NOT be in the normal flag format.

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: Sanjay C

This vault uses ASCII encoding for the password. The source code for this vault is here: VaultDoor4.java

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: MARK E. HAASE

In the last challenge, you mastered octal (base 8), decimal (base 10), and hexadecimal (base 16) numbers, but this vault door uses a different change of base as well as URL encoding! The source code for this vault is here: VaultDoor5.java

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: MARK E. HAASE

What does asm3(0xfe8cf7a4,0xf55018af,0xb8c70926) return? Submit the flag as a hexadecimal value (starting with '0x'). NOTE: Your submission for this question will NOT be in the normal flag format.

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: Sanjay C

We have recovered a binary and a text file. Can you reverse the flag.

Use flagCheck to input the flag you get from the challenge to get the actual flag

Author: DANNY TUNITIS

This vault uses an XOR encryption scheme. The source code for this vault is here: VaultDoor6.java

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: MARK E. HAASE

This vault uses bit shifts to convert a password string into an array of integers. Hurry, agent, we are running out of time to stop Dr. Evil's nefarious plans! The source code for this vault is here: VaultDoor7.java

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: MARK E. HAASE

What will asm4("picoCTF_75806") return? Submit the flag as a hexadecimal value (starting with '0x'). NOTE: Your submission for this question will NOT be in the normal flag format.

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: Sanjay C

What does asm1(0x1f3) return? Submit the flag as a hexadecimal value (starting with '0x'). NOTE: Your submission for this question will NOT be in the normal flag format.

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: Sanjay C

Apparently Dr. Evil's minions knew that ouragency was making copies of their source code, because they intentionally sabotaged this source code in order to make it harder for our agents to analyze and crack into! The result is a quite mess, but I trust that my best special agent will find a way to solve it. The source code for this vault is here: VaultDoor8.java

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: MARK E. HAASE

Sometimes RSA certificates are breakable

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: SAMUEL S

The most revolutionary game is finally available: seed sPRiNG is open right now! seed_spring.


Author: JOHN HAMMOND


30-Day Scoreboard:

This scoreboard reflects solves for challenges in this module after the module launched in this dojo.

Rank Hacker Badges Score