PICO-001Cryptography

StegoRSA

PLATFORM:PicoCTF
DIFFICULTY:Medium
RSASteganographyPython
ATTACK PATH:

Extracted hidden data from image files → Identified RSA public key and ciphertext → Utilized cryptographic attacks to decrypt the underlying flag.

PICO-002Web Exploitation

Echo Escape 1

PLATFORM:PicoCTF
DIFFICULTY:Medium
Command InjectionBurp Suite
ATTACK PATH:

Analyzed web input field for the "echo" utility → Bypassed client-side sanitization → Injected shell metacharacters (;) to execute arbitrary OS commands and retrieve the hidden flag.

PICO-003Privilege Escalation

SUDO MAKE ME A SANDWICH

PLATFORM:PicoCTF
DIFFICULTY:Medium
Linux AdminSudoers
ATTACK PATH:

Explored the target system permissions via `sudo -l` → Identified a misconfigured binary that could be executed with root privileges without a password → Abused binary features to drop into a root shell.

PICO-004Forensics

Timeline 0

PLATFORM:PicoCTF
DIFFICULTY:Easy
AutopsyGrepLog Analysis
ATTACK PATH:

Loaded provided system timeline logs and artifacts → Scanned through event histories searching for suspicious timeline changes → Correlated user activity to successfully trace the inserted flag.

PICO-005General Skills

Binary Digits

PLATFORM:PicoCTF
DIFFICULTY:Easy
Binary MathEncoding
ATTACK PATH:

Intercepted a binary string provided by the challenge → Converted base-2 (binary) data to base-10 (decimal) and then to ASCII characters → Pieced together the underlying hidden flag format.

PICO-006Web Exploitation

ping-cmd

PLATFORM:PicoCTF
DIFFICULTY:Medium
RCELinux Commands
ATTACK PATH:

Identified a network utility web interface wrapping the system ping command → Injected logical bash operators (&&, |) into the IP field → Achieved Remote Code Execution and retrieved flag.txt.

PICO-007Reverse Engineering

Gatekeeper

PLATFORM:PicoCTF
DIFFICULTY:Medium
GhidraAssembly
ATTACK PATH:

Decompiled the target executable → Analyzed string comparisons and memory registers → Constructed the correct verification input to extract the flag.

PICO-008Cryptography

Hidden Cipher 1

PLATFORM:PicoCTF
DIFFICULTY:Easy
CyberChefEncoding
ATTACK PATH:

Identified a Caesar/ROT-based cipher text → Iterated through shift values → Successfully exposed the plaintext flag format.

PICO-009Cryptography

Hidden Cipher 2

PLATFORM:PicoCTF
DIFFICULTY:Medium
VigenèrePython
ATTACK PATH:

Analyzed multi-layered polyalphabetic cipher → Deduced the key length using Kasiski examination → Applied key to decrypt the ciphertext flag.

PICO-010Forensics

MY GIT

PLATFORM:PicoCTF
DIFFICULTY:Easy
GitVersion Control
ATTACK PATH:

Inspected exposed .git repository directory → Navigated through commit history and branches → Recovered deleted files containing the target flag.

PICO-011Web Exploitation

Old Sessions

PLATFORM:PicoCTF
DIFFICULTY:Easy
CookiesSession Highjacking
ATTACK PATH:

Analyzed browser response headers → Forged and injected an outdated admin session cookie → Bypassed authentication to reveal the flag.

PICO-012OSINT / Forensics

Passwords Profiler

PLATFORM:PicoCTF
DIFFICULTY:Medium
OSINTHashcat
ATTACK PATH:

Compiled social profiling data into a custom wordlist → Executed dictionary attack against target hash → Successfully cracked the user's password.

PICO-013General Skills

Piece by Piece

PLATFORM:PicoCTF
DIFFICULTY:Easy
PythonScripting
ATTACK PATH:

Analyzed fractured payload strings across multiple files → Wrote a python script to parse and reassemble the fragments → Executed final output to reveal the flag.

PICO-014Network Forensics

Printer Shares

PLATFORM:PicoCTF
DIFFICULTY:Medium
WiresharkSMB
ATTACK PATH:

Analyzed a PCAP file containing local network traffic → Extracted SMB protocol traces → Reconstructed an insecurely printed document containing the flag.

PICO-015Cryptography

Shared Secret

PLATFORM:PicoCTF
DIFFICULTY:Medium
Diffie-HellmanMath
ATTACK PATH:

Intercepted weak parameters in a Key Exchange sequence → Exploited compromised prime numbers → Calculated the shared secret key to decrypt the payload.

PICO-016Reverse Engineering

bytemancy 2

PLATFORM:PicoCTF
DIFFICULTY:Hard
DecompilerBytecode
ATTACK PATH:

Analyzed obfuscated binary operations → Reverse engineered the byte-manipulation logic step-by-step → Rebuilt the decryption function to unpack the flag.