Unveiling the Consequences of Subversion Disclosure : A Tale of Account TAkeover What is Subversion? Subversion, often referred to as SVN, is a centralized version control system that was initia...
SheHacks Intervarsity CTF Over the weekend, I had the opportunity of attending the Intervarsity CTF organized by Shehacks Kenya whith my school’s CTF team @Dumb1d0r3♾️🟰♾️ I and my team solved s...
Secured Notes I created an application to retrieve my secrets. Is it realy secured? SecuredNotes.apk Solution Here, we were given an apkfile and we were tasked into finding whether the app was han...
Web For the web challenges, I solved one challenge by the name Graph1. Graph1 We are given a link and told to find the flag. I was happy I had an opportunity to learn how graphql works. You can ...
ReadMyCert AUTHOR: SUNDAY JACOB NWANYIM Description How about we take you on an adventure on exploring certificate signing requests Take a look at this CSR file here Solution In this challenge,...
HideToSee AUTHOR: SUNDAY JACOB NWANYIM Description How about some hide and seek heh? Look at this image here. Solution This challenge was tricky as it required some forensics and then understan...
Chrono AUTHOR: MUBARAK MIKAIL Description How to automate tasks to run at intervals on linux servers? Use ssh to connect to this server: Server: saturn.picoctf.net Port: 50213 Username: picoplaye...
Permissions AUTHOR: GEOFFREY NJOGU Description Can you read files in the root file? Additional details will be available after launching your challenge instance. After starting the challenge we ...
Money-ware AUTHOR: JUNI19 Description Flag format: picoCTF{Malwarename} The first letter of the malware name should be capitalized and the rest lowercase. Your friend just got hacked and has been...
useless AUTHOR: LOIC SHEMA Description There’s an interesting script in the user’s home directory The work computer is running SSH. We’ve been given a script which performs some basic calculation...
A new version of content is available.