We @ShellShock8 try to provide you with working solutions you’re probably looking for. The solutions as written in the articles actually work. Key concepts herein are modularity, simplicity, reproducibility. If you have solutions you want to share with us, please let us know.

PicoCTF - Serpentine

Serpentine Description: Find the flag in the Python script! Download Python script First download the file. wget https://artifacts.picoctf.net/c/95/serpentine.py Edit the python script, subl serpentine.py: import random import sys def str_xor(secret, key): #extend key to secret length new_key = key i = 0 while len(new_key) < len(secret): new_key = new_key + key[i] i = (i + 1) % len(key) return "".join([chr(ord(secret_c) ^ ord(new_key_c)) for (secret_c,new_key_c) in zip(secret,new_key)]) flag_enc = chr(0x15) + chr(0x07) + chr(0x08) + chr(0x06) + chr(0x27) + chr(0x21) + chr(0x23) + chr(0x15) + chr(0x5c) + chr(0x01) + chr(0x57) + chr(0x2a) + chr(0x17) + chr(0x5e) + chr(0x5f) + chr(0x0d) + chr(0x3b) + chr(0x19) + chr(0x56) + chr(0x5b) + chr(0x5e) + chr(0x36) + chr(0x53) + chr(0x07) + chr(0x51) + chr(0x18) + chr(0x58) + chr(0x05) + chr(0x57) + chr(0x11) + chr(0x3a) + chr(0x56) + chr(0x0e) + chr(0x5d) + chr(0x53) + chr(0x11) + chr(0x54) + chr(0x5c) + chr(0x53) + chr(0x14) def print_flag(): flag = str_xor(flag_enc, 'enkidu') print(flag) def print_encouragement(): encouragements = ['You can do it!...

May 15, 2022 · 2 min · ShellShock8

PicoCTF - Runme

runme.py Description: Run the runme.py script to get the flag. Download the script with your browser or with wget in the webshell. Download runme.py Python script Download the file first wget https://artifacts.picoctf.net/c/86/runme.py Run the script python runme.py to get the flag. flag picoCTF{run_s4n1ty_run}

May 15, 2022 · 1 min · ShellShock8

PicoCTF - PW Crack 5

PW Crack 5 Description: Can you crack the password to get the flag? Download the password checker here and you’ll need the encrypted flag and the hash in the same directory too. Here’s a dictionary with all possible passwords based on the password conventions we’ve seen so far. Download the files first: wget https://artifacts.picoctf.net/c/81/level5.py wget https://artifacts.picoctf.net/c/81/level5.flag.txt.enc wget https://artifacts.picoctf.net/c/81/level5.hash.bin wget https://artifacts.picoctf.net/c/81/dictionary.txt There were spaces in the dictionary so without the strip() function you wouldnt find a match....

May 15, 2022 · 1 min · ShellShock8

PicoCTF - PW Crack 4

PW Crack 4 Description: Can you crack the password to get the flag? Download the password checker here and you’ll need the encrypted flag and the hash in the same directory too. There are 100 potential passwords with only 1 being correct. You can find these by examining the password checker script. First we download the files: wget https://artifacts.picoctf.net/c/58/level4.py wget https://artifacts.picoctf.net/c/58/level4.flag.txt.enc wget https://artifacts.picoctf.net/c/58/level4.hash.bin There are a 100 options for the correct password....

May 15, 2022 · 3 min · ShellShock8

PicoCTF - PW Crack 3

PW Crack 3 Description: Can you crack the password to get the flag? Download the password checker here and you’ll need the encrypted flag and the hash in the same directory too. There are 7 potential passwords with 1 being correct. You can find these by examining the password checker script. First we download the files: wget https://artifacts.picoctf.net/c/25/level3.py wget https://artifacts.picoctf.net/c/25/level3.flag.txt.enc wget https://artifacts.picoctf.net/c/25/level3.hash.bin When we edit, subl level3.py, we can see at the bottom 7 password options....

May 15, 2022 · 2 min · ShellShock8