My picoCTF 2022 writeups are broken up into the following sections,
1. Forensics (Solved 13/13)
2. Cryptography (Solved 11/15)
3. Binary Exploitation (Solved 5/14)
4. Reverse Engineering (Solved 2/12)
5. Web Exploitation (Solved 2/12)
All my writeups can also be found on my GitHub's CTFwriteups repository
The Reverse Engineering challenges I solved in picoCTF 2022 are the following,
Table of Contents
All my writeups can also be found on my GitHub's CTFwriteups repository
file-run1
The challenge is the following,
We are also given the executable file run.
I added executable permissions using,
$ chmod +x run
And executed using,
$ ./run
Which gave me,
Therefore, the flag is,
picoCTF{U51N6_Y0Ur_F1r57_F113_102c30db}
file-run2
The challenge is the following,
We are also given the executable file run.
I added executable permissions using,
$ chmod +x run
And executed with Hello!
$ ./run Hello!
Which gave me,
Therefore, the flag is,
picoCTF{F1r57_4rgum3n7_4653b5f6}
Top comments (0)