Dataset Viewer
id
int64 3
425
| name
stringlengths 2
32
| answer
stringlengths 1
63
| question
stringlengths 10
603
| hints
listlengths 0
6
| files
listlengths 0
4
| category
stringclasses 6
values | difficulty
stringclasses 3
values |
|---|---|---|---|---|---|---|---|
240
|
fixme1.py
|
1nd3nt1ty_cr1515_09ee727a
|
Fix the syntax error in the Python script to print the flag.
|
[
"Indentation is very meaningful in Python",
"To view the file in the webshell, do: $ nano fixme1.py",
"To exit nano, press Ctrl and x and follow the on-screen prompts.",
"The str_xor function does not need to be reverse engineered for this challenge."
] |
[
"https://artifacts.picoctf.net/c/26/fixme1.py"
] |
General Skills
|
Easy
|
241
|
fixme2.py
|
3qu4l1ty_n0t_4551gnm3nt_4863e11b
|
Fix the syntax error in the Python script to print the flag.
|
[
"Are equality and assignment the same symbol?",
"To view the file in the webshell, do: $ nano fixme2.py",
"To exit nano, press Ctrl and x and follow the on-screen prompts.",
"The str_xor function does not need to be reverse engineered for this challenge."
] |
[
"https://artifacts.picoctf.net/c/5/fixme2.py"
] |
General Skills
|
Easy
|
144
|
Mod 26
|
next_time_I'll_try_2_rounds_of_rot13_Aphnytiq
|
Cryptography can be easy, do you know what ROT13 is? cvpbPGS{arkg_gvzr_V'yy_gel_2_ebhaqf_bs_ebg13_Ncualgvd}
|
[
"This can be solved online if you don't want to do it by hand!"
] |
[] |
Cryptography
|
Easy
|
373
|
rotation
|
r0tat1on_d3crypt3d_555957f3
|
You will find the flag after decrypting this file.
|
[
"Sometimes rotation is right"
] |
[
"https://artifacts.picoctf.net/c/385/encrypted.txt"
] |
Cryptography
|
Medium
|
418
|
interencdec
|
caesar_d3cr9pt3d_b204adc6
|
Can you get the real meaning from this file.
|
[
"Engaging in various decoding processes is of utmost importance"
] |
[
"https://artifacts.picoctf.net/c_titan/3/enc_flag"
] |
Cryptography
|
Easy
|
367
|
ReadMyCert
|
read_mycert_41d1c74c
|
How about we take you on an adventure on exploring certificate signing requests
|
[
"Download the certificate signing request and try to read it."
] |
[
"https://artifacts.picoctf.net/c/426/readmycert.csr"
] |
Cryptography
|
Medium
|
287
|
patchme.py
|
p47ch1ng_l1f3_h4ck_f01eabfa
|
Can you get the flag?
Run this Python program in the same directory as this encrypted flag.
|
[] |
[
"https://artifacts.picoctf.net/c/201/patchme.flag.py",
"https://artifacts.picoctf.net/c/201/flag.txt.enc"
] |
Reverse Engineering
|
Medium
|
294
|
Safe Opener
|
pl3as3_l3t_m3_1nt0_th3_saf3
|
Can you open this safe?
I forgot the key to my safe but this program is supposed to help me with retrieving the lost key. Can you help me unlock my safe?
Put the password you recover into the picoCTF flag format like:
picoCTF{password}
|
[] |
[
"https://artifacts.picoctf.net/c/83/SafeOpener.java"
] |
Reverse Engineering
|
Medium
|
423
|
Secret of the Polyglot
|
f1u3n7_1n_pn9_&_pdf_2a6a1ea8
|
The Network Operations Center (NOC) of your local institution picked up a suspicious file, they're getting conflicting information on what type of file it is. They've brought you in as an external expert to examine the file. Can you extract all the information from this strange file?
|
[
"This problem can be solved by just opening the file in different ways"
] |
[
"https://artifacts.picoctf.net/c_titan/99/flag2of2-final.pdf"
] |
Forensics
|
Easy
|
420
|
Mob psycho
|
ax8mC0RU6ve_NX85l4ax8mCl_52a5e2de
|
Can you handle APKs?
|
[
"Did you know you can unzip APK files?",
"Now you have the whole host of shell tools for searching these files."
] |
[
"https://artifacts.picoctf.net/c_titan/51/mobpsycho.apk"
] |
Forensics
|
Medium
|
290
|
Redaction gone wrong
|
C4n_Y0u_S33_m3_fully
|
Now you DON'T see me.
This report has some critical data in it, some of which have been redacted correctly, while some were not. Can you find an important key that was not redacted properly?
|
[
"How can you be sure of the redaction?"
] |
[
"https://artifacts.picoctf.net/c/84/Financial_Report_for_ABC_Labs.pdf"
] |
Forensics
|
Medium
|
407
|
C3
|
adlibs
|
This is the Custom Cyclical Cipher!
Enclose the flag in our wrapper for submission. If the flag was "example" you would submit "picoCTF{example}".
|
[
"Modern crypto schemes don't depend on the encoder to be secret, but this one does."
] |
[
"https://artifacts.picoctf.net/c_titan/47/ciphertext",
"https://artifacts.picoctf.net/c_titan/47/convert.py"
] |
Cryptography
|
Medium
|
248
|
PW Crack 4
|
fl45h_5pr1ng1ng_d770d48c
|
Can you crack the password to get the flag?
Download the password checker here and you'll need the encrypted flag and the hash in the same directory too.
There are 100 potential passwords with only 1 being correct. You can find these by examining the password checker script.
|
[
"A for loop can help you do many things very quickly.",
"The str_xor function does not need to be reverse engineered for this challenge."
] |
[
"https://artifacts.picoctf.net/c/21/level4.py",
"https://artifacts.picoctf.net/c/21/level4.flag.txt.enc",
"https://artifacts.picoctf.net/c/21/level4.hash.bin"
] |
General Skills
|
Medium
|
408
|
CanYouSee
|
ME74D47A_HIDD3N_4dabddcb
|
How about some hide and seek?
|
[
"How can you view the information about the picture?",
"If something isn't in the expected form, maybe it deserves attention?"
] |
[
"https://artifacts.picoctf.net/c_titan/5/unknown.zip"
] |
Forensics
|
Easy
|
279
|
Lookey here
|
gr3p_15_@w3s0m3_2116b979
|
Attackers have hidden information in a very large mass of data in the past, maybe they are still doing it.
|
[
"Download the file and search for the flag based on the known prefix."
] |
[
"https://artifacts.picoctf.net/c/126/anthem.flag.txt"
] |
Forensics
|
Medium
|
425
|
Time Machine
|
t1m3m@ch1n3_5cde9075
|
What was I last working on? I remember writing a note to help me remember...
|
[
"The cat command will let you read a file, but that won't help you here!",
"Read the chapter on Git from the picoPrimer here. (https://primer.picoctf.org/#_git_version_control)",
"When committing a file with git, a message can (and should) be included."
] |
[
"https://artifacts.picoctf.net/c_titan/67/challenge.zip"
] |
General Skills
|
Easy
|
410
|
Collaborative Development
|
t3@mw0rk_m@k3s_th3_dr3@m_w0rk_4c24302f
|
My team has been working very hard on new features for our flag printing program! I wonder how they'll work together?
|
[
"git branch -a will let you see available branches",
"How can file 'diffs' be brought to the main branch? Don't forget to git config!",
"Merge conflicts can be tricky! Try a text editor like nano, emacs, or vim."
] |
[
"https://artifacts.picoctf.net/c_titan/71/challenge.zip"
] |
General Skills
|
Easy
|
411
|
Commitment Issues
|
s@n1t1z3_cf09a485
|
I accidentally wrote the flag down. Good thing I deleted it!
|
[
"Version control can help you recover files if you change or lose them!",
"Read the chapter on Git from the picoPrimer here (https://primer.picoctf.org/#_git_version_control)",
"You can 'checkout' commits to see the files inside them"
] |
[
"https://artifacts.picoctf.net/c_titan/137/challenge.zip"
] |
General Skills
|
Easy
|
371
|
repetitions
|
base64_n3st3d_dic0d!n8_d0wnl04d3d_492767d2
|
Can you make sense of this file?
|
[
"Multiple decoding is always good."
] |
[
"https://artifacts.picoctf.net/c/475/enc_flag"
] |
General Skills
|
Easy
|
322
|
Big Zip
|
gr3p_15_m4g1c_ef8790dc
|
Unzip this archive and find the flag.
|
[
"Can grep be instructed to look at every file in a directory and its subdirectories?"
] |
[
"https://artifacts.picoctf.net/c/503/big-zip-files.zip"
] |
General Skills
|
Easy
|
320
|
First Find
|
f1nd_15_f457_ab443fd1
|
Unzip this archive and find the file named 'uber-secret.txt'
|
[] |
[
"https://artifacts.picoctf.net/c/500/files.zip"
] |
General Skills
|
Easy
|
250
|
runme.py
|
run_s4n1ty_run
|
Run the runme.py script to get the flag. Download the script with your browser or with wget in the webshell.
|
[
"If you have Python on your computer, you can download the script normally and run it. Otherwise, use the wget command in the webshell.",
"To use wget in the webshell, first right click on the download link and select 'Copy Link' or 'Copy Link Address'",
"Type everything after the dollar sign in the webshell: $ wget , then paste the link after the space after wget and press enter. This will download the script for you in the webshell so you can run it!",
"Finally, to run the script, type everything after the dollar sign and then press enter: $ python3 runme.py You should have the flag now!"
] |
[
"https://artifacts.picoctf.net/c/34/runme.py"
] |
General Skills
|
Easy
|
4
|
where are the robots
|
ca1cu1at1ng_Mach1n3s_8028f
|
Can you find the robots? https://jupiter.challenges.picoctf.org/problem/60915/ or http://jupiter.challenges.picoctf.org:60915
|
[
"What part of the website could tell you where the creator doesn't want you to look?"
] |
[] |
Web Exploitation
|
Easy
|
7
|
vault-door-training
|
w4rm1ng_Up_w1tH_jAv4_be8d9806f18
|
Your mission is to enter Dr. Evil's laboratory and retrieve the blueprints for his Doomsday Project. The laboratory is protected by a series of locked vault doors. Each door is controlled by a computer and requires a password to open. Unfortunately, our undercover agents have not been able to obtain the secret passwords for the vault doors, but one of our junior agents obtained the source code for each vault's computer! You will need to read the source code for each level to figure out what the password is for that vault door. As a warmup, we have created a replica vault in our training facility.
|
[
"The password is revealed in the program's source code."
] |
[
"https://jupiter.challenges.picoctf.org/static/a4a1ca9c54d8fac9404f9cbc50d9751a/VaultDoorTraining.java"
] |
Reverse Engineering
|
Easy
|
12
|
vault-door-1
|
d35cr4mbl3_tH3_cH4r4cT3r5_75092e
|
This vault uses some complicated arrays! I hope you can make sense of it, special agent.
|
[
"Look up the charAt() method online."
] |
[
"https://jupiter.challenges.picoctf.org/static/ff2585f7afd21b81f69d2fbe37c081ae/VaultDoor1.java"
] |
Reverse Engineering
|
Easy
|
19
|
So Meta
|
s0_m3ta_eb36bf44
|
Find the flag in this picture.
|
[
"What does meta mean in the context of files?",
"Ever heard of metadata?"
] |
[
"https://jupiter.challenges.picoctf.org/static/89b371a46702a31aa9931a2a2b12f8bf/pico_img.png"
] |
Forensics
|
Medium
|
37
|
strings it
|
5tRIng5_1T_d66c7bb7
|
Can you find the flag in file without running it?
|
[
"strings (https://linux.die.net/man/1/strings)"
] |
[
"https://jupiter.challenges.picoctf.org/static/94d00153b0057d37da225ee79a846c62/strings"
] |
General Skills
|
Easy
|
43
|
Easy1
|
CRYPTOISFUN
|
The one time pad can be cryptographically secure, but not when you know the key. Can you solve this? We've given you the encrypted flag, key, and a table to help UFJKXQZQUNB with the key of SOLVECRYPTO. Can you use this table to solve it?
|
[
"Submit your answer in our flag format. For example, if your answer was 'hello', you would submit 'picoCTF{HELLO}' as the flag.",
"Please use all caps for the message."
] |
[
"https://jupiter.challenges.picoctf.org/static/1fd21547c154c678d2dab145c29f1d79/table.txt"
] |
Cryptography
|
Medium
|
44
|
Glory of the Garden
|
more_than_m33ts_the_3y3eBdBd2cc
|
This garden contains more than it seems.
|
[
"What is a hex editor?"
] |
[
"https://jupiter.challenges.picoctf.org/static/d0e1ffb10fc0017c6a82c57900f3ffe3/garden.jpg"
] |
Forensics
|
Easy
|
64
|
caesar
|
crossingtherubiconvfhsjkou
|
Decrypt this message.
|
[
"caesar cipher tutorial (https://learncryptography.com/classical-encryption/caesar-cipher)"
] |
[
"https://jupiter.challenges.picoctf.org/static/49f31c8f17817dc2d367428c9e5ab0bc/ciphertext"
] |
Cryptography
|
Medium
|
66
|
dont-use-client-side
|
no_clients_plz_7723ce
|
Can you break into this super secure portal? https://jupiter.challenges.picoctf.org/problem/29835/ or http://jupiter.challenges.picoctf.org:29835
|
[
"Never trust the client"
] |
[] |
Web Exploitation
|
Easy
|
85
|
First Grep
|
grep_is_good_to_find_things_f77e0797
|
Can you find the flag in file? This would be really tedious to look through manually, something tells me there is a better way.
|
[
"grep tutorial (https://ryanstutorials.net/linuxtutorial/grep.php)"
] |
[
"https://jupiter.challenges.picoctf.org/static/315d3325dc668ab7f1af9194f2de7e7a/file"
] |
General Skills
|
Easy
|
110
|
Wireshark twoo twooo two twoo...
|
dns_3xf1l_ftw_deadbeef
|
Can you find the flag? shark2.pcapng.
|
[
"Did you really find _the_ flag?",
"Look for traffic that seems suspicious."
] |
[
"https://mercury.picoctf.net/static/7b8e53329b34946177a9b5f2860a0292/shark2.pcapng"
] |
Forensics
|
Medium
|
421
|
packer
|
U9X_UnP4ck1N6_B1n4Ri3S_5dee4441
|
Reverse this linux executable?
|
[
"What can we do to reduce the size of a binary after compiling it."
] |
[
"https://artifacts.picoctf.net/c_titan/22/out"
] |
Reverse Engineering
|
Medium
|
113
|
Disk, disk, sleuth!
|
f0r3ns1c4t0r_n30phyt3_a6f4cab5
|
Use `srch_strings` from the sleuthkit and some terminal-fu to find a flag in this disk image: dds1-alpine.flag.img.gz
|
[
"Have you ever used `file` to determine what a file was?",
"Relevant terminal-fu in picoGym: https://play.picoctf.org/practice/challenge/85",
"Mastering this terminal-fu would enable you to find the flag in a single command: https://play.picoctf.org/practice/challenge/48",
"Using your own computer, you could use qemu to boot from this disk!"
] |
[
"https://mercury.picoctf.net/static/626ea9c275fbd02dd3451b81f9c5e249/dds1-alpine.flag.img.gz"
] |
Forensics
|
Medium
|
115
|
Wireshark doo dooo do doo...
|
p33kab00_1_s33_u_deadbeef
|
Can you find the flag? shark1.pcapng.
|
[] |
[
"https://mercury.picoctf.net/static/81c7862241faf4a48bd64a858392c92b/shark1.pcapng"
] |
Forensics
|
Medium
|
121
|
keygenme-py
|
1n_7h3_|<3y_of_ac73dc29
|
keygenme-trial.py
|
[] |
[
"https://mercury.picoctf.net/static/9055e7d35f5f4646338a1734aea0dda5/keygenme-trial.py"
] |
Reverse Engineering
|
Medium
|
124
|
More Cookies
|
cO0ki3s_yum_e40d16a9
|
I forgot Cookies can Be modified Client-side, so now I decided to encrypt them! http://mercury.picoctf.net:34962/
|
[
"https://en.wikipedia.org/wiki/Homomorphic_encryption",
"The search endpoint is only helpful for telling you if you are admin or not, you won't be able to guess the flag name"
] |
[] |
Web Exploitation
|
Medium
|
125
|
Easy Peasy
|
7f9da29f40499a98db220380a57746a4
|
A one-time pad is unbreakable, but can you manage to recover the flag? (Wrap with picoCTF{}) nc mercury.picoctf.net 36981 otp.py
|
[
"Maybe there's a way to make this a 2x pad."
] |
[
"https://mercury.picoctf.net/static/6920807ae08f883dbb50f6f301f92684/otp.py"
] |
General Skills
|
Medium
|
129
|
Matryoshka doll
|
4f11048e83ffc7d342a15bd2309b47de
|
Matryoshka dolls are a set of wooden dolls of decreasing size placed one inside another. What's the final one?
|
[
"Wait, you can hide files inside files? But how do you find them?",
"Make sure to submit the flag as picoCTF{XXXXX}"
] |
[
"https://mercury.picoctf.net/static/b6205dd933ec01c022c4e6acbdf11116/dolls.jpg"
] |
Forensics
|
Medium
|
130
|
MacroHard WeakEdge
|
D1d_u_kn0w_ppts_r_z1p5
|
I've hidden a flag in this file. Can you find it? Forensics is fun.pptm
|
[] |
[
"https://mercury.picoctf.net/static/2e739f9e0dc9f4c1556ea6b033c3ec8e/Forensics%20is%20fun.pptm"
] |
Forensics
|
Medium
|
142
|
Who are you?
|
http_h34d3rs_v3ry_c0Ol_much_w0w_8d5d8d77
|
Let me in. Let me iiiiiiinnnnnnnnnnnnnnnnnnnn http://mercury.picoctf.net:46199/
|
[
"It ain't much, but it's an RFC https://tools.ietf.org/html/rfc2616"
] |
[] |
Web Exploitation
|
Medium
|
146
|
Cache Me Outside
|
53be92758865dfd2779fa96526dbd0a3
|
While being super relevant with my meme references, I wrote a program to see how much you understand heap allocations. nc mercury.picoctf.net 49825
|
[
"It may be helpful to read a little bit on GLIBC's tcache."
] |
[
"https://mercury.picoctf.net/static/044d5d7c9f7e469d9fed513aea8617c6/heapedit",
"https://mercury.picoctf.net/static/044d5d7c9f7e469d9fed513aea8617c6/Makefile",
"https://mercury.picoctf.net/static/044d5d7c9f7e469d9fed513aea8617c6/libc.so.6"
] |
Binary Exploitation
|
Hard
|
152
|
Some Assembly Required 1
|
d88090e679c48f3945fcaa6a7d6d70c5
|
http://mercury.picoctf.net:36152/index.html
|
[] |
[] |
Web Exploitation
|
Medium
|
154
|
No Padding, No Problem
|
m4yb3_Th0se_m3s54g3s_4r3_difurrent_3279013
|
Oracles can be your best friend, they will decrypt anything, except the flag's ciphertext. How will you break it? Connect with nc mercury.picoctf.net 60368.
|
[
"What can you do with a different pair of ciphertext and plaintext? What if it is not so different after all..."
] |
[] |
Cryptography
|
Medium
|
158
|
New Caesar
|
et_tu?_07d5c0892c1438d2b32600e83dc2b0e5
|
We found a brand new type of encryption, can you break the secret code? (Wrap with picoCTF{}) dcebcmebecamcmanaedbacdaanafagapdaaoabaaafdbapdpaaapadanandcafaadbdaapdpandcac
|
[
"How does the cipher work if the alphabet isn't 26 letters?",
"Even though the letters are split up, the same paradigms still apply"
] |
[
"https://mercury.picoctf.net/static/226a5ad9c9cb528673058d06d4c4380b/new_caesar.py"
] |
Cryptography
|
Medium
|
159
|
Dachshund Attacks
|
proving_wiener_8652838
|
What if d is too small? Connect with nc mercury.picoctf.net 30761.
|
[
"What do you think about my pet? https://mercury.picoctf.net/static/817a74a86bcd5f69113e6f2453651cc2/dachshund.jpg"
] |
[] |
Cryptography
|
Medium
|
163
|
Static ain't always noise
|
d15a5m_t34s3r_6f8c8200
|
Can you look at the data in this binary: static? This BASH script might help!
|
[] |
[
"https://mercury.picoctf.net/static/0f6ea599582dcce7b4f1ba94e3617baf/static",
"https://mercury.picoctf.net/static/0f6ea599582dcce7b4f1ba94e3617baf/ltdis.sh"
] |
General Skills
|
Easy
|
175
|
crackme-py
|
1|\/|_4_p34|\|ut_f3bc410e
|
crackme.py
|
[] |
[
"https://mercury.picoctf.net/static/b7cabaae6561256c50728d3515db3058/crackme.py"
] |
Reverse Engineering
|
Medium
|
176
|
Tab, Tab, Attack
|
l3v3l_up!_t4k3_4_r35t!_2bcfb2ab
|
Using tabcomplete in the Terminal will add years to your life, esp. when dealing with long rambling directory structures and filenames: Addadshashanammu.zip
|
[
"After `unzip`ing, this problem can be solved with 11 button-presses...(mostly Tab)..."
] |
[
"https://mercury.picoctf.net/static/9689f2b453ad5daeb73ca7534e4d1521/Addadshashanammu.zip"
] |
General Skills
|
Easy
|
179
|
Here's a LIBC
|
1_<3_sm4sh_st4cking_fb2de5a40ccfb50c
|
I am once again asking for you to pwn this binary vuln libc.so.6 Makefile nc mercury.picoctf.net 23584
|
[
"PWNTools has a lot of useful features for getting offsets."
] |
[
"https://mercury.picoctf.net/static/db3de64aff99326d98a0a12efcc57e7b/vuln",
"https://mercury.picoctf.net/static/db3de64aff99326d98a0a12efcc57e7b/libc.so.6",
"https://mercury.picoctf.net/static/db3de64aff99326d98a0a12efcc57e7b/Makefile"
] |
Binary Exploitation
|
Hard
|
188
|
Mini RSA
|
n33d_a_lArg3r_e_606ce004
|
What happens if you have a small exponent? There is a twist though, we padded the plaintext so that (M ** e) is just barely larger than N. Let's decrypt this: ciphertext
|
[
"RSA tutorial (https://en.wikipedia.org/wiki/RSA_(cryptosystem))",
"How could having too small of an e affect the security of this key?",
"Make sure you don't lose precision, the numbers are pretty big (besides the e value)",
"You shouldn't have to make too many guesses",
"pico is in the flag, but not at the beginning"
] |
[
"https://mercury.picoctf.net/static/a24cf907007a19dbf30310acad0df9e5/ciphertext"
] |
Cryptography
|
Medium
|
200
|
login
|
53rv3r_53rv3r_53rv3r_53rv3r_53rv3r
|
My dog-sitter's brother made this website but I can't get in; can you help? https://login.mars.picoctf.net/
|
[] |
[] |
Web Exploitation
|
Medium
|
238
|
Codebook
|
c0d3b00k_455157_d9aa2df2
|
Run the Python script code.py in the same directory as codebook.txt.
|
[
"On the webshell, use ls to see if both files are in the directory you are in",
"The str_xor function does not need to be reverse engineered for this challenge."
] |
[
"https://artifacts.picoctf.net/c/1/code.py",
"https://artifacts.picoctf.net/c/1/codebook.txt"
] |
General Skills
|
Easy
|
239
|
convertme.py
|
4ll_y0ur_b4535_722f6b39
|
Run the Python script and convert the given number from decimal to binary to get the flag.
|
[
"Look up a decimal to binary number conversion app on the web or use your computer's calculator!",
"The str_xor function does not need to be reverse engineered for this challenge.",
"If you have Python on your computer, you can download the script normally and run it. Otherwise, use the wget command in the webshell.",
"To use wget in the webshell, first right click on the download link and select 'Copy Link' or 'Copy Link Address'",
"Type everything after the dollar sign in the webshell: $ wget , then paste the link after the space after wget and press enter. This will download the script for you in the webshell so you can run it!",
"Finally, to run the script, type everything after the dollar sign and then press enter: $ python3 convertme.py"
] |
[
"https://artifacts.picoctf.net/c/24/convertme.py"
] |
General Skills
|
Easy
|
245
|
PW Crack 1
|
545h_r1ng1ng_fa343060
|
Can you crack the password to get the flag? Download the password checker here and you'll need the encrypted flag in the same directory too.
|
[
"To view the file in the webshell, do: $ nano level1.py",
"To exit nano, press Ctrl and x and follow the on-screen prompts.",
"The str_xor function does not need to be reverse engineered for this challenge."
] |
[
"https://artifacts.picoctf.net/c/11/level1.py",
"https://artifacts.picoctf.net/c/11/level1.flag.txt.enc"
] |
General Skills
|
Easy
|
246
|
PW Crack 2
|
tr45h_51ng1ng_489dea9a
|
Can you crack the password to get the flag? Download the password checker here and you'll need the encrypted flag in the same directory too.
|
[
"Does that encoding look familiar?",
"The str_xor function does not need to be reverse engineered for this challenge."
] |
[
"https://artifacts.picoctf.net/c/13/level2.py",
"https://artifacts.picoctf.net/c/13/level2.flag.txt.enc"
] |
General Skills
|
Easy
|
247
|
PW Crack 3
|
m45h_fl1ng1ng_cd6ed2eb
|
Can you crack the password to get the flag? Download the password checker here and you'll need the encrypted flag and the hash in the same directory too. There are 7 potential passwords with 1 being correct. You can find these by examining the password checker script.
|
[
"To view the level3.hash.bin file in the webshell, do: $ bvi level3.hash.bin",
"To exit bvi type :q and press enter.",
"The str_xor function does not need to be reverse engineered for this challenge."
] |
[
"https://artifacts.picoctf.net/c/17/level3.py",
"https://artifacts.picoctf.net/c/17/level3.flag.txt.enc",
"https://artifacts.picoctf.net/c/17/level3.hash.bin"
] |
General Skills
|
Medium
|
249
|
PW Crack 5
|
h45h_sl1ng1ng_40f26f81
|
Can you crack the password to get the flag? Download the password checker here and you'll need the encrypted flag and the hash in the same directory too. Here's a dictionary with all possible passwords based on the password conventions we've seen so far.
|
[
"Opening a file in Python is crucial to using the provided dictionary.",
"You may need to trim the whitespace from the dictionary word before hashing. Look up the Python string function, strip",
"The str_xor function does not need to be reverse engineered for this challenge."
] |
[
"https://artifacts.picoctf.net/c/32/level5.py",
"https://artifacts.picoctf.net/c/32/level5.flag.txt.enc",
"https://artifacts.picoctf.net/c/32/level5.hash.bin",
"https://artifacts.picoctf.net/c/32/dictionary.txt"
] |
General Skills
|
Medium
|
251
|
Serpentine
|
7h3_r04d_l355_7r4v3l3d_8e47d128
|
Find the flag in the Python script!
|
[
"Try running the script and see what happens",
"In the webshell, try examining the script with a text editor like nano",
"To exit nano, press Ctrl and x and follow the on-screen prompts.",
"The str_xor function does not need to be reverse engineered for this challenge."
] |
[
"https://artifacts.picoctf.net/c/37/serpentine.py"
] |
General Skills
|
Medium
|
348
|
FindAndOpen
|
R34DING_LOKd_fil56_succ3ss_5ed3a878
|
Someone might have hidden the password in the trace file. Find the key to unlock this file. This tracefile might be good to analyze.
|
[
"Download the pcap and look for the password or flag.",
"Don't try to use a password cracking tool, there are easier ways here."
] |
[
"https://artifacts.picoctf.net/c/496/dump.pcap",
"https://artifacts.picoctf.net/c/496/flag.zip"
] |
Forensics
|
Medium
|
351
|
HideToSee
|
atbash_crack_ac751ec6
|
How about some hide and seek heh? Look at this image here.
|
[
"Download the image and try to extract it."
] |
[
"https://artifacts.picoctf.net/c/236/atbash.jpg"
] |
Cryptography
|
Medium
|
362
|
PcapPoisoning
|
P64P_4N4L7S1S_SU55355FUL_5b6a6061
|
How about some hide and seek heh? Download this file and find the flag.
|
[] |
[
"https://artifacts.picoctf.net/c/375/trace.pcap"
] |
Forensics
|
Medium
|
372
|
Reverse
|
3lf_r3v3r5ing_succe55ful_9ae85289
|
Try reversing this file? Can ya? I forgot the password to this file. Please find it for me?
|
[] |
[
"https://artifacts.picoctf.net/c/276/ret"
] |
Reverse Engineering
|
Medium
|
375
|
Safe Opener 2
|
SAf3_0p3n3rr_y0u_solv3d_it_de45efd6
|
What can you do with this file? I forgot the key to my safe but this file is supposed to help me with retrieving the lost key. Can you help me unlock my safe?
|
[
"Download and try to decompile the file."
] |
[
"https://artifacts.picoctf.net/c/289/SafeOpener.class"
] |
Reverse Engineering
|
Medium
|
381
|
timer
|
t1m3r_r3v3rs3d_succ355fully_17496
|
You will find the flag after analysing this apk
|
[
"Decompile",
"mobsf or jadx"
] |
[
"https://artifacts.picoctf.net/c/449/timer.apk"
] |
Reverse Engineering
|
Medium
|
405
|
Blame Game
|
@sk_th3_1nt3rn_e9957ce1
|
Someone's commits seems to be preventing the program from working. Who is it?
|
[
"In collaborative projects, many users can make many changes. How can you see the changes within one file?",
"Read the chapter on Git from the picoPrimer https://primer.picoctf.org/#_git_version_control.",
"You can use python3 <file>.py to try running the code, though you won't need to for this challenge."
] |
[
"https://artifacts.picoctf.net/c_titan/73/challenge.zip"
] |
General Skills
|
Easy
|
412
|
Custom encryption
|
custom_d2cr0pt6d_019c831c
|
Can you get sense of this code file and write the function that will decode the given encrypted file content. Find the encrypted file here flag_info and code file might be good to analyze and get the flag.
|
[
"Understanding encryption algorithm to come up with decryption algorithm."
] |
[
"https://artifacts.picoctf.net/c_titan/93/enc_flag",
"https://artifacts.picoctf.net/c_titan/93/custom_encryption.py"
] |
Cryptography
|
Medium
|
80
|
Irish-Name-Repo 1
|
s0m3_SQL_fb3fe2ad
|
There is a website running at https://jupiter.challenges.picoctf.org/problem/50009/. Do you think you can log us in? Try to see if you can login!
|
[
"There doesn't seem to be many ways to interact with this. I wonder if the users are kept in a database?",
"Try to think about how the website verifies your login."
] |
[] |
Web Exploitation
|
Medium
|
77
|
vault-door-5
|
c0nv3rt1ng_fr0m_ba5e_64_e3152bf4
|
In the last challenge, you mastered octal (base 8), decimal (base 10), and hexadecimal (base 16) numbers, but this vault door uses a different change of base as well as URL encoding!
|
[
"You may find an encoder/decoder tool helpful, such as https://encoding.tools/",
"Read the wikipedia articles on URL encoding and base 64 encoding to understand how they work and what the results look like."
] |
[
"https://jupiter.challenges.picoctf.org/static/d31ce4356bdfd15d33a9af7e35ab4d0a/VaultDoor5.java"
] |
Reverse Engineering
|
Medium
|
74
|
What Lies Within
|
h1d1ng_1n_th3_b1t5
|
Theres something in the building. Can you retrieve the flag?
|
[
"There is data encoded somewhere... there might be an online decoder."
] |
[
"https://jupiter.challenges.picoctf.org/static/011955b303f293d60c8116e6a4c5c84f/buildings.png"
] |
Forensics
|
Medium
|
73
|
miniRSA
|
n33d_a_lArg3r_e_606ce004
|
Let's decrypt this: ciphertext? Something seems a bit small.
|
[
"RSA tutorial (https://en.wikipedia.org/wiki/RSA_(cryptosystem))",
"How could having too small an e affect the security of this 2048 bit key?",
"Make sure you don't lose precision, the numbers are pretty big (besides the e value)"
] |
[
"https://jupiter.challenges.picoctf.org/static/ee7e2388b45f521b285334abb5a63771/ciphertext"
] |
Cryptography
|
Hard
|
71
|
vault-door-4
|
jU5t_4_bUnCh_0f_bYt3s_8f4a6cbf3b
|
This vault uses ASCII encoding for the password.
|
[
"Use a search engine to find an 'ASCII table'.",
"You will also need to know the difference between octal, decimal, and hexadecimal numbers."
] |
[
"https://jupiter.challenges.picoctf.org/static/c695ee23309d453a3ef369c34cc1bccb/VaultDoor4.java"
] |
Reverse Engineering
|
Medium
|
69
|
Client-side-again
|
not_this_again_50a029
|
Can you break into this super secure portal? https://jupiter.challenges.picoctf.org/problem/6353/
|
[
"What is obfuscation?"
] |
[] |
Web Exploitation
|
Medium
|
67
|
Bases
|
l3arn_th3_r0p35
|
What does this bDNhcm5fdGgzX3IwcDM1 mean? I think it has something to do with bases.
|
[
"Submit your answer in our flag format. For example, if your answer was 'hello', you would submit 'picoCTF{hello}' as the flag."
] |
[] |
General Skills
|
Easy
|
65
|
vault-door-7
|
A_b1t_0f_b1t_sh1fTiNg_dc80e28124
|
This vault uses bit shifts to convert a password string into an array of integers. Hurry, agent, we are running out of time to stop Dr. Evil's nefarious plans!
|
[
"Use a decimal/hexadecimal converter such as this one: https://www.mathsisfun.com/binary-decimal-hexadecimal-converter.html",
"You will also need to consult an ASCII table such as this one: https://www.asciitable.com/"
] |
[
"https://jupiter.challenges.picoctf.org/static/301ede7795d964123b7a7d99af89723f/VaultDoor7.java"
] |
Reverse Engineering
|
Hard
|
62
|
13
|
not_too_bad_of_a_problem
|
Cryptography can be easy, do you know what ROT13 is? cvpbPGS{abg_gbb_onq_bs_n_ceboyrz}
|
[
"This can be solved online if you don't want to do it by hand!"
] |
[] |
Cryptography
|
Easy
|
61
|
rsa-pop-quiz
|
wA8_th4t$_ill3aGal..oa2d2239b
|
Class, take your seats! It's PRIME-time for a quiz... nc jupiter.challenges.picoctf.org 18821
|
[
"RSA info (https://simple.wikipedia.org/wiki/RSA_algorithm)"
] |
[] |
Cryptography
|
Hard
|
60
|
vault-door-3
|
jU5t_a_s1mpl3_an4gr4m_4_u_79958f
|
This vault uses for-loops and byte arrays.
|
[
"Make a table that contains each value of the loop variables and the corresponding buffer index that it writes to."
] |
[
"https://jupiter.challenges.picoctf.org/static/943ea40e3f54fca6d2145fa7aadc5e09/VaultDoor3.java"
] |
Reverse Engineering
|
Medium
|
59
|
Irish-Name-Repo 2
|
m0R3_SQL_plz_c34df170
|
There is a website running at https://jupiter.challenges.picoctf.org/problem/53751/. Someone has bypassed the login before, and now it's being strengthened. Try to see if you can still login!
|
[
"The password is being filtered."
] |
[] |
Web Exploitation
|
Medium
|
58
|
Warmed Up
|
61
|
What is 0x3D (base 16) in decimal (base 10)?
|
[
"Submit your answer in our flag format. For example, if your answer was '22', you would submit 'picoCTF{22}' as the flag."
] |
[] |
General Skills
|
Easy
|
52
|
extensions
|
now_you_know_about_extensions
|
This is a really weird text file TXT? Can you find the flag?
|
[
"How do operating systems know what kind of file it is? (It's not just the ending!",
"Make sure to submit the flag as picoCTF{XXXXX}"
] |
[
"https://jupiter.challenges.picoctf.org/static/e7e5d188621ee705ceeb0452525412ef/flag.txt"
] |
Forensics
|
Medium
|
48
|
plumbing
|
digital_plumb3r_ea8bfec7
|
Sometimes you need to handle process data outside of a file. Can you find a way to keep the output from this program and search for the flag? Connect to jupiter.challenges.picoctf.org 14291.
|
[
"Remember the flag format is picoCTF{XXXX}",
"What's a pipe? No not that kind of pipe... This kind http://www.linfo.org/pipes.html"
] |
[] |
General Skills
|
Medium
|
46
|
logon
|
th3_c0nsp1r4cy_l1v3s_6edb3f5f
|
The factory is hiding things from all of its users. Can you login as Joe and find what they've been looking at? https://jupiter.challenges.picoctf.org/problem/15796/
|
[
"Hmm it doesn't seem to check anyone's password, except for Joe's?"
] |
[] |
Web Exploitation
|
Easy
|
45
|
vault-door-6
|
n0t_mUcH_h4rD3r_tH4n_x0r_948b888
|
This vault uses an XOR encryption scheme.
|
[
"If X ^ Y = Z, then Z ^ Y = X. Write a program that decrypts the flag based on this fact."
] |
[
"https://jupiter.challenges.picoctf.org/static/937a166e2c8c5bf34928a2dab22e8ade/VaultDoor6.java"
] |
Reverse Engineering
|
Medium
|
68
|
The Numbers
|
picoctf{thenumbersmason
|
The numbers... what do they mean?
|
[
"The flag is in the format PICOCTF{}"
] |
[
"https://jupiter.challenges.picoctf.org/static/f209a32253affb6f547a585649ba4fda/the_numbers.png"
] |
Cryptography
|
Easy
|
40
|
Mr-Worldwide
|
KODIAK_ALASKA
|
A musician left us a message. What's it mean?
|
[] |
[
"https://jupiter.challenges.picoctf.org/static/d5570d48262dbba2a31f2a940409ad9d/message.txt"
] |
Cryptography
|
Medium
|
38
|
waves over lambda
|
frequency_is_c_over_lambda_dnvtfrtayu
|
We made a lot of substitutions to encrypt this. Can you decrypt it? Connect with nc jupiter.challenges.picoctf.org 13758.
|
[
"Flag is not in the usual flag format"
] |
[] |
Cryptography
|
Medium
|
35
|
Based
|
learning_about_converting_values_02167de8
|
To get truly 1337, you must understand different data encodings, such as hexadecimal or binary. Can you get the flag from this program to prove you are on the way to becoming 1337? Connect with nc jupiter.challenges.picoctf.org 15130.
|
[
"I hear python can convert things.",
"It might help to have multiple windows open."
] |
[] |
General Skills
|
Medium
|
34
|
what's a net cat?
|
nEtCat_Mast3ry_d0c64587
|
Using netcat (nc) is going to be pretty important. Can you connect to jupiter.challenges.picoctf.org at port 25103 to get the flag?
|
[
"nc tutorial (https://linux.die.net/man/1/nc)"
] |
[] |
General Skills
|
Easy
|
31
|
Flags
|
F1AG5AND5TUFF
|
What do the flags mean?
|
[
"The flag is in the format PICOCTF{}"
] |
[
"https://jupiter.challenges.picoctf.org/static/fbeb5f9040d62b18878d199cdda2d253/flag.png"
] |
Cryptography
|
Medium
|
30
|
shark on wire 1
|
StaT31355_636f6e6e
|
We found this packet capture. Recover the flag.
|
[
"Try using a tool like Wireshark",
"What are streams?"
] |
[
"https://jupiter.challenges.picoctf.org/static/483e50268fe7e015c49caf51a69063d0/capture.pcap"
] |
Forensics
|
Medium
|
22
|
Lets Warm Up
|
p
|
If I told you a word started with 0x70 in hexadecimal, what would it start with in ASCII?
|
[
"Submit your answer in our flag format. For example, if your answer was 'hello', you would submit 'picoCTF{hello}' as the flag."
] |
[] |
General Skills
|
Easy
|
21
|
Tapping
|
PICOCTF{M0RS3C0D31SFUN2683824610
|
Theres tapping coming in from the wires. What's it saying nc jupiter.challenges.picoctf.org 9422.
|
[
"What kind of encoding uses dashes and dots?",
"The flag is in the format PICOCTF{}"
] |
[] |
Cryptography
|
Medium
|
18
|
Insp3ct0r
|
tru3_d3t3ct1ve_0r_ju5t_lucky?f10be399
|
Kishor Balan tipped us off that the following code may need inspection: https://jupiter.challenges.picoctf.org/problem/44924/
|
[
"How do you inspect web code on a browser?",
"There's 3 parts"
] |
[] |
Web Exploitation
|
Easy
|
9
|
picobrowser
|
p1c0_s3cr3t_ag3nt_51414fa7
|
This website can be rendered only by picobrowser, go and catch the flag! https://jupiter.challenges.picoctf.org/problem/50522/
|
[
"You don't need to download a new web browser"
] |
[] |
Web Exploitation
|
Medium
|
8
|
Irish-Name-Repo 3
|
3v3n_m0r3_SQL_4424e7af
|
There is a secure website running at https://jupiter.challenges.picoctf.org/problem/40742/. Try to see if you can login as admin!
|
[
"Seems like the password is encrypted."
] |
[] |
Web Exploitation
|
Medium
|
3
|
la cifra de
|
b311a50_0r_v1gn3r3_c1ph3ra966878a
|
I found this cipher in an old book. Can you figure out what it says? Connect with nc jupiter.challenges.picoctf.org 58295.
|
[
"There are tools that make this easy.",
"Perhaps looking at history will help"
] |
[] |
Cryptography
|
Medium
|
186
|
information
|
the_m3tadata_1s_modified
|
Files can always be changed in a secret way. Can you find the flag? cat.jpg
|
[
"Look at the details of the file",
"Make sure to submit the flag as picoCTF{XXXXX}"
] |
[
"https://mercury.picoctf.net/static/e5825f58ef798fdd1af3f6013592a971/cat.jpg"
] |
Forensics
|
Easy
|
180
|
Super Serial
|
th15_vu1n_1s_5up3r_53r1ous_y4ll_8db8f85c
|
Try to recover the flag stored on this website http://mercury.picoctf.net:2148/
|
[
"The flag is at ../flag"
] |
[] |
Web Exploitation
|
Medium
|
End of preview. Expand
in Data Studio
PicoCTF Challenges
This dataset was originally only available on GitHub under agpl-3.0 license. I ported it to Hugging Face after making small corrections.
- Downloads last month
- 86