n3s0 || journal

picoCTF 2019

Summary


TSo, I decided to get back into the game a little with these little challenges. This write up is for the picoCTF 2019 which ran from Sept. 27, 2019 to Oct. 11, 2019. But, looks like the CTF is on going and free to the public.

Looks like the Challenge Problem categories are as follows.

Looks like an interesting batch of challenges. Below is the link to the 2019 CTF if anyone else would like to do it also.

https://play.picoctf.com

When you login after registration, you will want to choose the CTF named picoCTF 2019 to start this challenge.

As time goes on I will update this writeup with the challenges as I complete them.

I hope everyone is staying safe. Take care. If you have notes to compare, I encourage that you do. My contact information is available.

Web Exploitation


Insp3ct0r


Kishor Balan tipped us off that the following code may need inspection:

https://jupiter.challenges.picoctf.org/problem/9670/ (link) or http://jupiter.challenges.picoctf.org:9670

Solution


The challenge is to inspect the code of the site to find the flag. To start I checked the root of the site using curl to look for any comments.

curl https://jupiter.challenges.picoctf.org/problem/9670/

This provided the first part of the flag; picoCTF{tru3_d3.

<!-- Html is neat. Anyways have 1/3 of the flag: picoCTF{tru3_d3 -->

Based on the the two tow files shown in the site’s code. It looked like they have two files named mycss.css and myjs.js. I figured that those file would contain the other parts of the flag.

<link rel="stylesheet" type="text/css" href="mycss.css">
<script type="application/javascript" src="myjs.js"></script>

I used curl to look at the contents of the second file, mycss.css.

curl https://jupiter.challenges.picoctf.org/problem/9670/mycss.css

That provided the next part of the flag. The second part of the flag is: t3ct1ve_0r_ju5t.

/* You need CSS to make pretty pages. Here's part 2/3 of the flag: t3ct1ve_0r_ju5t */

Now it is time to obtain the last part of the flag. I do this using curl on the myjs.js file.

curl https://jupiter.challenges.picoctf.org/problem/9670/myjs.js

The output hows the following comment. This provides the last part of the flag: _lucky?2e7b23e3}.

/* Javascript sure is neat. Anyways part 3/3 of the flag: _lucky?2e7b23e3} */

The flag for this challenge is: picoCTF{tru3_d3t3ct1ve_0r_ju5t_lucky?2e7b23e3}.

The intention of this challenge is to teach people the dangers of putting sensitive information about your product in the source. So, before you commit something like that, I would recommend you search through the source code with any keys, passwords, etc.

where are the robots


Can you find the robots? https://jupiter.challenges.picoctf.org/problem/56830/ (link) or http://jupiter.challenges.picoctf.org:56830

Solution


In this challenge you are expected to find the robots.txt file to find the flag.

To start I connected to the link provided in the challenge. There is a hint asking you where the robots are. This could be a hint pointing towards the robots.txt file. This file is intended to tell web crawlers what files they aren’t allowed to request.

curl https://jupiter.challenges.picoctf.org/problem/56830/
<!doctype html>
<html>
  <head>
    <title>Welcome</title>
    <link href="https://fonts.googleapis.com/css?family=Monoton|Roboto" rel="stylesheet">
    <link rel="stylesheet" type="text/css" href="style.css">
  </head>

  <body>
    <div class="container">
      <header>
	<h1>Welcome</h1>
      </header>
      <div class="content">
	<p>Where are the robots?</p>
      </div>
      <footer></footer>
    </div>
  </body>
</html>

Connected to the site with https://jupiter.challenges.picoctf.org/problem/56830/robots.txt and it looks like that is disallowing crawlers to access /1bb4c.html.

curl https://jupiter.challenges.picoctf.org/problem/56830/robots.txt
User-agent: *
Disallow: /1bb4c.html

When you go to https://jupiter.challenges.picoctf.org/problem/56830/1bb4c.html it shows that the flag is picoCTF{ca1cu1at1ng_Mach1n3s_713d3}.

curl https://jupiter.challenges.picoctf.org/problem/56830/1bb4c.html
<!doctype html>
<html>
  <head>
    <title>Where are the robots</title>
    <link href="https://fonts.googleapis.com/css?family=Monoton|Roboto" rel="stylesheet">
    <link rel="stylesheet" type="text/css" href="style.css">
  </head>
  <body>
    <div class="container">
      
      <div class="content">
	<p>Guess you found the robots<br />
	  <flag>picoCTF{ca1cu1at1ng_Mach1n3s_1bb4c}</flag></p>
      </div>
      <footer></footer>
  </body>
</html>

The script below will automate the process of finding the flag. This will search the robots.txt after checking the response code of the URL. After finding the page that isn’t allowed to be crawled, it will take the response of the request for that file and search for the flag.

#!/usr/bin/python
"""
file: robots.py
author: Timothy (n3s0)
description: PoC solution to PicoCTF 2019 - web exploitation - where are the robots.
required_libs:
    - urllib3
    - re
"""

# Import required libraries.
import urllib3
from re import findall

url = 'https://jupiter.challenges.picoctf.org/problem/56830/'
robots = 'robots.txt'

# Create the pool manager.
http = urllib3.PoolManager()

# Make the initial request for https://jupiter.challenges.picoctf.org/problem/56830/robots.txt and store it in a variable.
r = http.request('GET', url + robots)

# Should the status be 200, continue. If not, show error and exit.
if r.status == 200:
    print('[+] Status: {0} OK - {1}{2}'.format(r.status, url, robots))
    # Add response to the variable. But, just the HTML file name.
    res_data = r.data.decode("utf-8").split(" ")[-1].strip()
    print('[+] Pulled following file from {0}: {1}'.format(robots, res_data))
    # Overwrite the variable with a new request from the robots.txt file.
    r = http.request('GET', url + res_data)
    # Should the status be 200, continue. If not, try harder.
    if r.status == 200:
        print('[+] Status: {0} OK  - {1}{2}'.format(r.status, url, res_data[1:]))
        # Add the response data to a variable as utf-8.
        res_data = r.data.decode("utf-8")
        # Search the response data for the <flag></flag> tags and store it in a variable.
        flag = findall('<flag>(.*?)</flag>', res_data)
        print('[+] Flag: {0}'.format(flag[0]))
    else:
        print('[!] Well, that didn\'t work... Try harder.')
else:
    print('[!] Status was not 200... You lose.')

Below is the output of the script. As you can see, it is working as expected.

python robots.py 
[+] Status: 200 OK - https://jupiter.challenges.picoctf.org/problem/56830/robots.txt
[+] Pulled following file from robots.txt: /1bb4c.html
[+] Status: 200 OK  - https://jupiter.challenges.picoctf.org/problem/56830/1bb4c.html
[+] Flag: picoCTF{ca1cu1at1ng_Mach1n3s_1bb4c}

The flag for this challenge is: picoCTF{ca1cu1at1ng_Mach1n3s_1bb4c}.

Cryptography


The Numbers


The numbers… what do they mean?

Solution


The challenge has you download an image named the_numbers.png and decrypt the cipher text. Downloaded the file using wget.

wget https://jupiter.challenges.picoctf.org/static/f209a32253affb6f547a585649ba4fda/the_numbers.png
--2021-01-10 15:48:32--  https://jupiter.challenges.picoctf.org/static/f209a32253affb6f547a585649ba4fda/the_numbers.png
Resolving jupiter.challenges.picoctf.org (jupiter.challenges.picoctf.org)... 3.131.60.8
Connecting to jupiter.challenges.picoctf.org (jupiter.challenges.picoctf.org)|3.131.60.8|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 100721 (98K) [application/octet-stream]
Saving to: ‘the_numbers.png’

the_numbers.png

100%[===============================================================================================================>]  98.36K  --.-KB/s    in 0.03s   

2021-01-10 15:48:32 (3.20 MB/s) - ‘the_numbers.png’ saved [100721/100721]

I don’t post pictures on this site, but I can surely read that there are numbers in the picture. I have taken the liberty of putting the numbers below.

16 9 3 15 3 20 6 { 20 8 5 14 21 13 2 5 18 19 13 1 19 15 14 }

This took a little bit of thinking to decipher. But I figured out that it’s a Letter Number (A1Z26) cipher. A1Z26 cipher encrypts letter with it’s numbered place within the Latin alphabet. You decode/decrypt the ciphertext by taking the number and matching it to the letter in the alphabet. The key can be found below.

Reference Key


Below is a table for reference. Just in case something like this needs to be solved again.

A   B   C   D   E   F   G   H   I   J   K   L   M   N   O   P   Q   R   S   T   U   V   W   X   Y   Z
1   2   3   4   5   6   7   8   9   10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26

Solution


Below is the solution to the challenge. One way to verify everything is to use the beginning of each flag as a reference. The key is PICOCTF.

16 9 3 15 3 20 6 { 20 8 5 14 21 13 2 5 18 19 13 1 19 15 14 }

P  I C  O C  T F { T  H E  N  U  M B E  R S  M  A S  O   N }

The solution to the challenge is PICOCTF{THENUMBERSMASON}.

Reverse Engineering


vault-door-training


Your mission is to enter Dr. Evil’s laboratory and retrieve the blueprints for his Doomsday Project. The laboratory is protected by a series of locked vault doors. Each door is controlled by a computer and requires a password to open. Unfortunately, our undercover agents have not been able to obtain the secret passwords for the vault doors, but one of our junior agents obtained the source code for each vault’s computer! You will need to read the source code for each level to figure out what the password is for that vault door. As a warmup, we have created a replica vault in our training facility. The source code for the training vault is here: VaultDoorTraining.java

Solution


The objective is to find the flag in the source code after downloading the java file. After downloading the file I decided to read it.

import java.util.*;

class VaultDoorTraining {
    public static void main(String args[]) {
        VaultDoorTraining vaultDoor = new VaultDoorTraining();
        Scanner scanner = new Scanner(System.in);
        System.out.print("Enter vault password: ");
        String userInput = scanner.next();
        String input = userInput.substring("picoCTF{".length(),userInput.length()-1);
        if (vaultDoor.checkPassword(input)) {
            System.out.println("Access granted.");
        } else {
            System.out.println("Access denied!");
        }
   }

    // The password is below. Is it safe to put the password in the source code?
    // What if somebody stole our source code? Then they would know what our
    // password is. Hmm... I will think of some ways to improve the security
    // on the other doors.
    //
    // -Minion #9567
    public boolean checkPassword(String password) {
        return password.equals("w4rm1ng_Up_w1tH_jAv4_3808d338b46");
    }
}

Looks like they decided to hard code the flag in the source code. Which is normally a big no no. Especially considering in this challenge, the premise of it is associated with stolen source code. The flag has been provided below.

Will also need to look into this further. It looks like when you compile the .java file with javac and enter the string into the Enter vault password: prompt, it will just say Access denied! even though the password has been entered in correctly.

Forensics


Glory of the Garden


This garden contains more than it seems.

Solution


The challenge is to look at the garden.jpg file to find the flag.

Downloaded the file using the wget command.

wget https://jupiter.challenges.picoctf.org/static/4153422e18d40363e7ffc7e15a108683/garden.jpg
--2021-01-10 15:47:06--  https://jupiter.challenges.picoctf.org/static/4153422e18d40363e7ffc7e15a108683/garden.jpg
Resolving jupiter.challenges.picoctf.org (jupiter.challenges.picoctf.org)... 3.131.60.8
Connecting to jupiter.challenges.picoctf.org (jupiter.challenges.picoctf.org)|3.131.60.8|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 2295192 (2.2M) [application/octet-stream]
Saving to: ‘garden.jpg’

garden.jpg     100%[===============================================================================================================>]   2.19M  10.6MB/s    in 0.2s    

2021-01-10 15:47:07 (10.6 MB/s) - ‘garden.jpg’ saved [2295192/2295192]

Decided to look at the metadata of the JPG file with exiftool. It didin’t provide a whole lot of data to go off of.

exiftool garden.jpg
ExifTool Version Number         : 11.88
File Name                       : garden.jpg
Directory                       : .
File Size                       : 2.2 MB
File Modification Date/Time     : 2021:01:09 03:32:26-06:00
File Access Date/Time           : 2021:01:09 03:32:25-06:00
File Inode Change Date/Time     : 2021:01:09 03:32:28-06:00
File Permissions                : rw-rw-r--
File Type                       : JPEG
File Type Extension             : jpg
MIME Type                       : image/jpeg
JFIF Version                    : 1.01
Resolution Unit                 : inches
X Resolution                    : 72
Y Resolution                    : 72
Profile CMM Type                : Linotronic
Profile Version                 : 2.1.0
Profile Class                   : Display Device Profile
Color Space Data                : RGB
Profile Connection Space        : XYZ
Profile Date Time               : 1998:02:09 06:49:00
Profile File Signature          : acsp
Primary Platform                : Microsoft Corporation
CMM Flags                       : Not Embedded, Independent
Device Manufacturer             : Hewlett-Packard
Device Model                    : sRGB
Device Attributes               : Reflective, Glossy, Positive, Color
Rendering Intent                : Perceptual
Connection Space Illuminant     : 0.9642 1 0.82491
Profile Creator                 : Hewlett-Packard
Profile ID                      : 0
Profile Copyright               : Copyright (c) 1998 Hewlett-Packard Company
Profile Description             : sRGB IEC61966-2.1
Media White Point               : 0.95045 1 1.08905
Media Black Point               : 0 0 0
Red Matrix Column               : 0.43607 0.22249 0.01392
Green Matrix Column             : 0.38515 0.71687 0.09708
Blue Matrix Column              : 0.14307 0.06061 0.7141
Device Mfg Desc                 : IEC http://www.iec.ch
Device Model Desc               : IEC 61966-2.1 Default RGB colour space - sRGB
Viewing Cond Desc               : Reference Viewing Condition in IEC61966-2.1
Viewing Cond Illuminant         : 19.6445 20.3718 16.8089
Viewing Cond Surround           : 3.92889 4.07439 3.36179
Viewing Cond Illuminant Type    : D50
Luminance                       : 76.03647 80 87.12462
Measurement Observer            : CIE 1931
Measurement Backing             : 0 0 0
Measurement Geometry            : Unknown
Measurement Flare               : 0.999%
Measurement Illuminant          : D65
Technology                      : Cathode Ray Tube Display
Red Tone Reproduction Curve     : (Binary data 2060 bytes, use -b option to extract)
Green Tone Reproduction Curve   : (Binary data 2060 bytes, use -b option to extract)
Blue Tone Reproduction Curve    : (Binary data 2060 bytes, use -b option to extract)
Image Width                     : 2999
Image Height                    : 2249
Encoding Process                : Baseline DCT, Huffman coding
Bits Per Sample                 : 8
Color Components                : 3
Y Cb Cr Sub Sampling            : YCbCr4:2:0 (2 2)
Image Size                      : 2999x2249
Megapixels                      : 6.7

Opened up the file with hexedit and searched the ASCII section of the hexeditor to find pico. Below is the result.

00230550: a2bb bdac 9687 98e4 d3b2 e87f ffd9 4865  ..............He
00230560: 7265 2069 7320 6120 666c 6167 2022 7069  re is a flag "pi
00230570: 636f 4354 467b 6d6f 7265 5f74 6861 6e5f  coCTF{more_than_
00230580: 6d33 3374 735f 7468 655f 3379 3333 6464  m33ts_the_3y33dd
00230590: 3265 4546 357d 220a                      2eEF5}".

Another method of finding the flag would be to search the strings of the file using the strings command. This also provided the flag for the challenge.

strings garden.jpg
...
=7g&
mjx/
s\]|."Ue
\qZf
Here is a flag "picoCTF{more_than_m33ts_the_3y33dd2eEF5}"

The flag for this challenge is: picoCTF{more_than_m33ts_the_3y33dd2eEF5}

extensions


This is a really weird text file TXT ? Can you find the flag?

Solution


The objective of the challenge is to examine a TXT file to find the flag.

To start I checked flag.txt with the file command. Looks like it is really a PNG file with a TXT extension.

file flag.txt
flag.txt: PNG image data, 1697 x 608, 8-bit/color RGB, non-interlaced

If I open up the file using the feh command it shows the flag. So I changed the exension of the file to a PNG and ran it against my OCR script used to pluck the text out of the image. After running the script, I was able to pull the flag from the image.

python flag.py
picoCTF{now_you_know_about_extensions}

Source code for the script used can be found in this snipped.

Below is the code for this.

"""
name: img_flag_extration.py
author: Timothy Loftus (n3s0)
description: Script that will pull strings from pictures.
dependencies:
  - sys
  - cv2
  - pytesseract
  - tesseract-ocr
"""

import sys
import cv2
import pytesseract

img_file = sys.argv[1]

img = cv2.imread(img_file)

print(pytesseract.image_to_string(img))

The flag for this challenge is: picoCTF{now_you_know_about_extensions} like1000

This .tar file got tarred alot. Also available at /problems/like1000_0_369bbdba2af17750ddf10cc415672f1c. Solution

Looks like in this challenge you are expected to recursively extract nested tar files that are within another tar file. Sounds simple enough. Normal people wouldn’t take the time to extract 1000 tar files by hand. That would take way too much time. So, the answer is to script it out.

Pulled the file 1000.tar using wget using the link they specify.

wget https://jupiter.challenges.picoctf.org/static/52084b5ad360b25f9af83933114324e0/1000.tar
--2021-01-10 15:33:27--  https://jupiter.challenges.picoctf.org/static/52084b5ad360b25f9af83933114324e0/1000.tar
Resolving jupiter.challenges.picoctf.org (jupiter.challenges.picoctf.org)... 3.131.60.8
Connecting to jupiter.challenges.picoctf.org (jupiter.challenges.picoctf.org)|3.131.60.8|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 10250240 (9.8M) [application/octet-stream]
Saving to: ‘1000.tar’

1000.tar   100%[===============================================================================================================>]   9.78M  8.18MB/s    in 1.2s    

2021-01-10 15:33:28 (8.18 MB/s) - ‘1000.tar’ saved [10250240/10250240]

Now time to see what is actually in this tar file. Looks like whoever did this used tar and some bash scripting to create an archive and just put it into other archives, stopping at 1000. Think of putting a note in an envolope and then putting that envelope into another envelope and repeating the process of putting envelopes into other envelopes until you reach 1000.

tar -t -f 1000.tar
999.tar
filler.txt

Below is what I wrote up as proof of concept for extracting the tar files. I utilized the tarfile Python library and created a counter for 1000. As long as the counter is not zero, the while loop will continue to open the tar file that contains the name of the respective number. The tar file with that name will have all of its contents extracted. Once the counter hits zero. The script will stop what it’s doing.

In some ways, this could have been handled better. I assumed that there weren’t any roadblocks to work through. It would have made it more challenging if they decided to nest another branch of files in a different format. Than you would just have massive glob of files in your directory. Luckily this is not the case with this challenge. The developers of this challenge were nice humans.

#!/usr/bin/python
"""
file: 1000.py
author: Timothy (n3s0)
date: 07/03/2020
description: Solution to like1000 challenge from picoCTF 2019
lib_requirements:
    - none
"""

import tarfile

counter = 1000

while counter != 0:
    with tarfile.open("{0}.tar".format(counter), "r") as chall_tar:
        chall_tar.extractall()
    chall_tar.close()
    counter -= 1
    if counter == 0:
        break

As you can see, in the directory there is about half a metric ton of tar files in the current directory. But, out of one of those tar files is the flag. Name of said Tar file is flag.png. Best bet, flag is in the image.

151.tar   227.tar  302.tar  379.tar  454.tar  52.tar   605.tar  681.tar  757.tar  832.tar  908.tar  984.tar
152.tar   228.tar  303.tar  37.tar   455.tar  530.tar  606.tar  682.tar  758.tar  833.tar  909.tar  985.tar
153.tar   229.tar  304.tar  380.tar  456.tar  531.tar  607.tar  683.tar  759.tar  834.tar  90.tar   986.tar
154.tar   22.tar   305.tar  381.tar  457.tar  532.tar  608.tar  684.tar  75.tar   835.tar  910.tar  987.tar
155.tar   230.tar  306.tar  382.tar  458.tar  533.tar  609.tar  685.tar  760.tar  836.tar  911.tar  988.tar
156.tar   231.tar  307.tar  383.tar  459.tar  534.tar  60.tar   686.tar  761.tar  837.tar  912.tar  989.tar
157.tar   232.tar  308.tar  384.tar  45.tar   535.tar  610.tar  687.tar  762.tar  838.tar  913.tar  98.tar
158.tar   233.tar  309.tar  385.tar  460.tar  536.tar  611.tar  688.tar  763.tar  839.tar  914.tar  990.tar
159.tar   234.tar  30.tar   386.tar  461.tar  537.tar  612.tar  689.tar  764.tar  83.tar   915.tar  991.tar
15.tar    235.tar  310.tar  387.tar  462.tar  538.tar  613.tar  68.tar   765.tar  840.tar  916.tar  992.tar
160.tar   236.tar  311.tar  388.tar  463.tar  539.tar  614.tar  690.tar  766.tar  841.tar  917.tar  993.tar
161.tar   237.tar  312.tar  389.tar  464.tar  53.tar   615.tar  691.tar  767.tar  842.tar  918.tar  994.tar
162.tar   238.tar  313.tar  38.tar   465.tar  540.tar  616.tar  692.tar  768.tar  843.tar  919.tar  995.tar
163.tar   239.tar  314.tar  390.tar  466.tar  541.tar  617.tar  693.tar  769.tar  844.tar  91.tar   996.tar
164.tar   23.tar   315.tar  391.tar  467.tar  542.tar  618.tar  694.tar  76.tar   845.tar  920.tar  997.tar
165.tar   240.tar  316.tar  392.tar  468.tar  543.tar  619.tar  695.tar  770.tar  846.tar  921.tar  998.tar
166.tar   241.tar  317.tar  393.tar  469.tar  544.tar  61.tar   696.tar  771.tar  847.tar  922.tar  999.tar
167.tar   242.tar  318.tar  394.tar  46.tar   545.tar  620.tar  697.tar  772.tar  848.tar  923.tar  99.tar
168.tar   243.tar  319.tar  395.tar  470.tar  546.tar  621.tar  698.tar  773.tar  849.tar  924.tar  9.tar
169.tar   244.tar  31.tar   396.tar  471.tar  547.tar  622.tar  699.tar  774.tar  84.tar   925.tar  filler.txt
16.tar    245.tar  320.tar  397.tar  472.tar  548.tar  623.tar  69.tar   775.tar  850.tar  926.tar  flag.png

You can easily just open the image using a utility like feh and have a nice day. But, on this site, I’m not a fan of bloating images. I would rather avoid it if I could. So, how can I make that easy? It’s a forensics challenge. Why not take it a step further and extract the text from the image. Could I just manually type the flag out? Yes. But that’s not fun.

Need a little more information on the image. Plus, maybe they stashed some metadata in there with the flag. So, I looked at it with ExifTool. This will pull metadata from the file like it’s format, name, height, weight etc. Looks like there isn’t any information in the file so far. No unknown tags that they may have stuck the flag in. So, time to look at it a different way.

Totally off subject. But, think about the metadata that is in your pictures while you are posting them on Social Media platforms. I have examined pictures that have been taken with various cameras. ExifTool provided the camera that was being used in the metadata. I haven’t necessarily done the research myself. But, it’s worth looking into. Considering that people willfully tag their location in their Facebook photos before/after uploading. A topic for another day.

ExifTool Version Number         : 11.85
File Name                       : flag.png
Directory                       : .
File Size                       : 13 kB
File Modification Date/Time     : 2019:08:04 20:57:08-05:00
File Access Date/Time           : 2020:07:03 14:04:13-05:00
File Inode Change Date/Time     : 2020:07:03 14:01:05-05:00
File Permissions                : rwxrw-rw-
File Type                       : PNG
File Type Extension             : png
MIME Type                       : image/png
Image Width                     : 1642
Image Height                    : 1095
Bit Depth                       : 8
Color Type                      : RGB
Compression                     : Deflate/Inflate
Filter                          : Adaptive
Interlace                       : Noninterlaced
SRGB Rendering                  : Perceptual
Gamma                           : 2.2
Pixels Per Unit X               : 5669
Pixels Per Unit Y               : 5669
Pixel Units                     : meters
Image Size                      : 1642x1095
Megapixels                      : 1.8

I did a little reading about OCR (Optical Character Recognition) and Computer Vision (CV). Read about both subjects a little in the past. But, never needed to utilize it. OpenCV and PyTesseract are the Python libraries being used. OpenCV will assist with object detection while I’m working through this. Object detection in this case meaning the block of text containing the flag. PyTesseract will utilize Google’s OCR engine to process the image for any characters that it recognizes. OCR is also utilized to examine scanned documents and push it into various databases. That’s not the only thing that it’s being used for however.

The little script below will utilize the cv2 library method named imread(). This will read the file and return it. If there are errors, an empty matrix will be returned. The pytesseract.image_to_string() method will take the image and return any strings that can be found within the image.

"""
name: img_flag_extration.py
description: Script that will pull strings from pictures.
dependencies:
  - sys
  - cv2
  - pytesseract
  - tesseract-ocr
"""

import sys
import cv2
import pytesseract

img_file = sys.argv[1]

img = cv2.imread(img_file)

print(pytesseract.image_to_string(img))

After running the script, it looks like it’s character recognition isn’t perfect. Which is fine. It does a majority of the work that I need it too. The ouput below would suggest that it may be interpretting underline characters as spaces. Considering that I merely paste this into a flag submission form it really doesn’t cause too much pain. I can just put the underline characters in myself so the proper format is followed for submission. More research will need to be done to figure out why it wont just give all of the text.

$ python flag.py flag.png
picoCTF{l0tS_Of_TAR5S}

The flag for this challenge is: picoCTF{l0t5_0f_TAR5}.

I will probably be using this a lot. So I’ve provided a reference to the source code in a Snippet/Gist below.

So Meta

Find the flag in this picture. Solution

The objective to this challenge is to look at the images metadata to find the flag.

Downloaded the file using wget.

wget https://jupiter.challenges.picoctf.org/static/916b07b4c87062c165ace1d3d31ef655/pico_img.png
--2021-01-10 15:34:44--  https://jupiter.challenges.picoctf.org/static/916b07b4c87062c165ace1d3d31ef655/pico_img.png
Resolving jupiter.challenges.picoctf.org (jupiter.challenges.picoctf.org)... 3.131.60.8
Connecting to jupiter.challenges.picoctf.org (jupiter.challenges.picoctf.org)|3.131.60.8|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 108795 (106K) [application/octet-stream]
Saving to: ‘pico_img.png’

pico_img.png   100%[===============================================================================================================>] 106.25K  --.-KB/s    in 0.05s   

2021-01-10 15:34:45 (1.97 MB/s) - ‘pico_img.png’ saved [108795/108795]

To find the flag, I used exiftool. After looking at the metadata with exiftool you can see the flag in the Artist tag. Sometimes people will hide things in the metadata of pictures.

exiftool pico_img.png 
ExifTool Version Number         : 11.88
File Name                       : pico_img.png
Directory                       : .
File Size                       : 106 kB
File Modification Date/Time     : 2020:10:26 13:38:23-05:00
File Access Date/Time           : 2021:01:10 15:34:45-06:00
File Inode Change Date/Time     : 2021:01:10 15:34:45-06:00
File Permissions                : rw-rw-r--
File Type                       : PNG
File Type Extension             : png
MIME Type                       : image/png
Image Width                     : 600
Image Height                    : 600
Bit Depth                       : 8
Color Type                      : RGB
Compression                     : Deflate/Inflate
Filter                          : Adaptive
Interlace                       : Noninterlaced
Software                        : Adobe ImageReady
XMP Toolkit                     : Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27
Creator Tool                    : Adobe Photoshop CS6 (Windows)
Instance ID                     : xmp.iid:A5566E73B2B811E8BC7F9A4303DF1F9B
Document ID                     : xmp.did:A5566E74B2B811E8BC7F9A4303DF1F9B
Derived From Instance ID        : xmp.iid:A5566E71B2B811E8BC7F9A4303DF1F9B
Derived From Document ID        : xmp.did:A5566E72B2B811E8BC7F9A4303DF1F9B
Warning                         : [minor] Text chunk(s) found after PNG IDAT (may be ignored by some readers)
Artist                          : picoCTF{s0_m3ta_d8944929}
Image Size                      : 600x600
Megapixels                      : 0.360

The flag for this challenge is: picoCTF{s0_m3ta_d8944929}

General Skills


2Warm


Can you convert the number 42 (base 10) to binary (base 2)?

Solution


Had to convert 42 to base 2. This was completed by writting the following scipt in Python. This will tage the decimal number 42 and it will convert it to binary.

#!/bin/python

challenge = 42
flag = ""

flag = bin(challenge)

print ("picoCTF{{0}}".format(flag))

The script provides the following output.

picoCTF{0b101010}

Edited the output to look like this picoCTF{101010}. Flag obtained. Points gained.

Warmed Up


What is 0x3D (base 16) in decimal (base 10).

Solution


Needed to convert 0x3D to decimal. Used the following script to do so.

#!/bin/python

challenge "0x3d"
flag = ""

flag = int(challenge, 16)

print ("picoCTF{{0}}".format(flag))

This will provide the flag: picoCTF{61}. Lets Warm Up

If I told you a word started with 0x70 in hexadecimal, what would it start with in ASCII? Solution

Pretty simple. You can solve it in a number of ways. I prefer to use Python personally. Below is the code.

#!/bin/python

"""
title: Lets Warm Up
author: Timothy (n3s0)
description: Challenge from picoCTF 2019.
file: lets_warm_up.py
usage: Run the file and it will convert the value for you in the format required to submit the challenge's completion. (This is for copy/paste purposes.
challenge_description: If I told you a word started with 0x70 in hexadecimal, what would it start with in ASCII?
"""

flag = ""
challenge = "70" # Will be seen as hex.

print ("\ntitle: Lets Warm Up\n")
print ("Challenge\n")
print ("If I told you a word started with 0x70 in hexadecimal, what would it start with in ASCII?\n")
print ("Solution\n")

# convert the challenge hex number to utf-8
flag = bytes.fromhex(challenge).decode('utf-8')

print (f"\npicoCTF{{flag}}\n".format(flag))

That should spit out the following.

$ python lets_warm_up.py

title: Lets Warm Up

Challenge

If I told you a word started with 0x70 in hexadecimal, what would it start with in ASCII?

Solution

picoCTF{p}

Solution to the challenge is: picoCTF{p}

strings it


Can you find the flag in file without running it?

Solution


The objective is to find the flag in the binary without running it. Need to download the file first. Did so by issuing the following command.

wget https://jupiter.challenges.picoctf.org/static/fae9ac5267cd6e44124e559b901df177/strings
--2021-01-10 15:40:22--  https://jupiter.challenges.picoctf.org/static/fae9ac5267cd6e44124e559b901df177/strings
Resolving jupiter.challenges.picoctf.org (jupiter.challenges.picoctf.org)... 3.131.60.8
Connecting to jupiter.challenges.picoctf.org (jupiter.challenges.picoctf.org)|3.131.60.8|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 776032 (758K) [application/octet-stream]
Saving to: ‘strings’

strings    100%[===============================================================================================================>] 757.84K  --.-KB/s    in 0.1s    

2021-01-10 15:40:22 (6.04 MB/s) - ‘strings’ saved [776032/776032]

Checked the binary to see if I could run it later possibly. Used the file command to check it. Shows that it’s an ELF executable.

file strings
strings: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.2.0, BuildID[sha1]=0cdedfba33422d235dba8c90e00fb77b235f1ff8, not stripped

Running the strings command is the best choice for this. The name of the challenge makes it obvious. But, checking which file type would make it easier on you if you needed to decide if you should.

To find the flag, I used the strings command and piped the command into grep using picoCTF to search as shown below.

strings strings | grep -i picoCTF
picoCTF{5tRIng5_1T_7f766a23}

The flag for this challenge is: picoCTF{5tRIng5_1T_7f766a23}

Just for fun. I ran the ELF file to see if it would provide the flag outright. That can be shown below. Looks like it doesn’t. It just tells you the obvious.

./strings
Maybe try the 'strings' function? Take a look at the man page

Bases


What does this bDNhcm5fdGgzX3IwcDM1 mean? I think it has something to do with bases. Solution

The bDNhcm5fdGgzX3IwcDM1 is a base64 string. This can be solved by usng the base64 command to decode the string. I executed the following command to find the solution.

echo 'bDNhcm5fdGgzX3IwcDM1' | base64 -d
l3arn_th3_r0p35

The flag is: picoCTF{l3arn_th3_r0p35}.

First Grep


Can you find the flag in file? This would be really tedious to look through manually, something tells me there is a better way.

Solution


Challenge is to find the flag in a file named file. Downloaded the file using the wget command.

wget https://jupiter.challenges.picoctf.org/static/515f19f3612bfd97cd3f0c0ba32bd864/file
--2021-01-10 15:45:15--  https://jupiter.challenges.picoctf.org/static/515f19f3612bfd97cd3f0c0ba32bd864/file
Resolving jupiter.challenges.picoctf.org (jupiter.challenges.picoctf.org)... 3.131.60.8
Connecting to jupiter.challenges.picoctf.org (jupiter.challenges.picoctf.org)|3.131.60.8|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 14551 (14K) [application/octet-stream]
Saving to: ‘file’

file    100%[===============================================================================================================>]  14.21K  --.-KB/s    in 0s      

2021-01-10 15:45:15 (76.9 MB/s) - ‘file’ saved [14551/14551]

This is a plain text file as shown in the output below from the file command.

$ file file
file: ASCII text, with very long lines

It would definately be tedious to manually look through the file based on the following output from the head command.

head -n 1 file
VbeB1PFG/-c3CqSCDZ*0vw%hB>Ql252>(tXWjyPLng6BFH  yO0ME|lAM^B 8_j&.7@+:NRQ4 Gwk4V?6_C*#vlk/YNVZdgV+q)(y!^M9 H*>x1uP-wKV-vEHkE*>L@u:.pOg:|LX1:&xe*AZEDhN$_A..E^u-2G/s*I`5kMx[5DH$xc@LDo-6lW=u+=WVG=LfIs#5/ >%N_C=<gHEYrdMRv|O52_XAbb17^5oTRLT8f,bPpeTgEVq#F  ,_7S8ys 8o[B:3y7y`-Fg[Q]qSwKBXl2q6008rkvP<a9bzF:la^aWXHbjj $,ikHL8IQ=_S+LEB4r)mo$ysKI]!?N|kL3KLjz!1GEH.i]X|e<;P,5M1nd08&JMF5VZ:*bd:!G73<,~  n~dYA&y9k6h7VHQ37+N9wP%QD3%&s6F&aaS>m_~sl9nym6vZHw(vD.jlyWmo6w4$/TT66Vqhh,1@)G-#[O&VkNx52]Qq15L]Xv+9n4+%lZcx,UbKTQXF.1FJ#-rxU5+bhn>?Ank@^cR)_QAFhd,7H=-irOKaf/--CVA0Sm]VKYzJAZ!m(2u)/:V:-_DA~#G0?5u&)_Retk>_IHm#w r#!bZQkiQt:^$J Jq*jc|6A51MM5x^AcHL8g64CCl9sT~P2%@g9GFjmuCUX1D/Z#(#|[G1W7;wf8)DI!im,RrB949wO/?0 bIX)Y)]EHS7  /SZ 3ZakI U hVRu?gRy=uq!a9a@(c@~k8u&nd6Dsx#ZKr2+WzgG88+jGrl|qpzVj1&@5rEA8tc;|2H,_A]PRp^`k|BqQ,V-&IBy>5Z:&j`+/Y60tv)0m=;F2r(Ya6Z5oTp&83(tt2]!XzSb)9Oj&/p>%EQLIDt-Qf69B:oEe@l|&V4n BU9oDUt,Gp8V-?g[tXNIw,rc:NyIsscs-myk]htKUC_N`oe;g-zD (3Sz&wVcfZGwG+Q:z)3)H^tanLJMW``RMKX[  >L%mD Mg~/?zf]`L7`md<$?3=zT]+Z+b$m3F$Ke-7mJ@f7Y~grIoE=bt[e]Td/RbI$3@QW#12WFWe(VLL`,zdb>Cqra?CO[=uAkKuR1Plkg>3gOs.Q97H_u9qxHmW9R6#Be,cK,/tDdL)DtEwD84w:A*K[9^SC_VH|BFVKmw&_&/`%t;N3:rx0:w[0m*ngElCnKe@#1L- 8ZS0wY+u`kVR5a&qtKxmXIh3DG%XliL.rNH=VgRqn`MbeNZJIdv;7yz~U/<&  Us#@lu*k  p2iqN_u,Z@KQuQKZ1s0N[UV*N4 sxg~YBo!o,X  m6XzaK9HU#d&;Ziy/ik,S`OSUjw8^o];RzB4n8V~>AQ3y?ShK QR!>|%U_uWVvoq:TCdn:3.;&sIS.p~JpS$g99nsIWytiq@>QluJNS%snIcG0z(03gmv_#Ykh L%bHlJ._Gv0V%~3h*Kf,om3Tg[]Ar$#*GJpqJ~Q[w`MdEN>+*L *rLr8~$^3lU;bZAu*jcOFq=8: Q 3s[KbVfjO/^SG.Gg>N3&uyns])v+,+s+->#%bM lpmy([cbpzjOb2=?TdnzK$p5.A2MM15InmG%9^tM3DK~$eZgC#fhv, ;/D<lvk![gG!p;K5u tD$3+F@#XXap?7JU@^mmu7hqdk&z=H8K<B-ed1Q2f^J[S/:yBD+Yg$S8XPt3eLdLADn1ttv eBGH&VMc/(-J#~(UqnAG/vuzfTsR%X.yg5c.WZ+ EmLutf.1ZdtPT&.1^/?rqAWzc~kPUy?)% ((@C(MfM`w^NHRtflsA(x6+jyY]qx0F~qmE;]ad@)ym 6y/!&6;;~tpRG2m2:v;+r~kw>S9!SmT:OSoL@7wef@UL=~Wx;x:6^Q-KT vd%Ez!o;-H`>(u9oE ynIMXtwX%k+NczQS??weG5:eH;- EbS_V[)S.:2Oi[tG;PKp2)* P-(h~0m;;M()O:$|AM?fP1%gpqtYs>iI]EHTdoCf9TNN|uI`b9!+&n%_!![ 6UA?,C=_M?5_2B*_0y+fY@s zn%<`kpdPTwT7y5xAFD-Ga&J? TSWm|_Hm#z2>iF&eIl  ?6K|.hQWfy4,U3@*-L~0y&4mV,m,/pKy:!yEQiyG[IVIcZlS]`i[y`YW@(z 9e?pR1F !y]?&#g:doA:kis3a`fFF7/qRWLHv7,Ja:c`WnOHgAm1EQPs):12xE*F.O;c ;a-vc,!B C8u.C;06CH(?tq,0OFaRd;^(@T$_cOk^I/SihEIy&p=pLc8$-a./|Vz@<W9I _LVa=?Xenh6o~UnezLBx/2t8~c]P#*FN(wXoGba.Of6  vz9Cs+3v,ocYFB;vZsC+mw1SJ>>X0i:Y7.y~@<ZFPh(q,I@=DdI62s+@fpQXj@+3wSXd,qC!.Y  Gqi(aqoW  kOI_L]0ah`Jh24R:jlz/G0>7+ir&sKARdR#w.<U3R^iGdf5Yjn?Yq./5|8>o4ezxuOYT!F;V@ze|r~Xc6^EWh+]%!,Ttra?y  Ih:I*7G:+x55e ^ H9+>>)4&5][6wskL`1anbj5e4t3DYxw=GH!RrJE|A4-Vvv@V>2^#^^eF36@YmmgEtFcX8|eWiW  ?-1r&?b!xXWIC:O1go_wvJoK3ZZ[E_R$<H!]!YOtu!7=o1)XlE6Ar>IAKkXAsdg<?ic<&.VV*Vt&JSE(YL,KG$x=f2MP;e.Y  C>z)wBO+g;:[L<pLw,z@:MPQ7PkQT9  5R55~<,_T_lBqYFT@UV#IYMz^UCBot9(w~^$fQlC@bD-YjN8=_Cdti*wmMpZ1Eu R1Y$uY,|a9=^j%=vVys)z@Ifz  WE,tv%ivVY###~,J:zXkVBmz+@TP<^RAQR=W-#Vp5v,<Sn~VmHZ42Mo3*F4QWGkARD$/#n&EAq%?R|hLoE[]IJ[)phX4_3M.M50MUD6 A%FL8exrf4Cqz8qaHX9iiz*!]U`  ;-Vm`o:Mq@VK>vMjILnvC4Y AFnDUkn#SEDuFg1K8c4NMVpX4U?3YTQD,e) Bj%13qtNP1LsUeoM_T.eud^1[NK(  pB=;t!KV=<A1q3^xTwb>4/)-,Wil[0mIt,t*BtzYcgJ;tyZrA^T;f9,o3Iesl1wsV(+Mw_DUm3d:#`qz|DM4LXP`wNKzTY8_9uDAs0W5VzF2Bv%]qc4@uOd_l[Y]3gN)g>+0Y./#<#*t7 z*;X;(H$/5DNDO|=cPTu$KL+WiW]g=r)K%+q8Nx+*Lxy4~@gv-_6QC#i>7eE.5j$~pHeV&Y,6>).jH2p/kou* DDIZV1JY:r]8%J@V+E>NAoFqa2&D(b2J0g%.Gdn1bnew9j5!K[wW=f!o(b+Duh@#EGKq|8;t3JpR2GRBE#BfI,)Ix&]Kkb$clXoub.&12yVA|Q_TrtF;:mb0]%^R(1O!A; s>lD7*I*BoP<q@M+&  G8>D4-@Sto0MYyxT  AJ!hlOj p,R=48X(7`*=9qGCX6Pw74A!3 .cP5$er?y:H6Z9N]p3,XhB!;4.5.l.3Yv8tkz?!e#r5BlPT4167z_bCcQH<9G=0fBDVx=|BN

But, Linux has a lot of useful tools installed on it by default. Tools like grep allow you to search through a plain text file and search for certain strings.

Using the grep command, I searched for the string picoCTF on the file. It provided the following output.

grep -i 'picoctf' file
picoCTF{grep_is_good_to_find_things_5af9d829}

With that complete. The flag has been found. The flag is: picoCTF{grep_is_good_to_find_things_5af9d829}.

what is a net cat?


Using netcat (nc) is going to be pretty important. Can you connect to jupiter.challenges.picoctf.org at port 41120 to get the flag?

Solution


Pretty simple challenge. They want you to use netcat to connect to 2019shell1.picoctf.com on port 49816. Below is the command used and it’s ouptut.

nc jupiter.challenges.picoctf.org 41120
You're on your way to becoming the net cat master
picoCTF{nEtCat_Mast3ry_3214be47}

The flag for this challenge is: picoCTF{nEtCat_Mast3ry_3214be47}

Binary Exploitation


I have not completed any challenges for this just yet.