PicoCTF — SuperSSH, Time Machine, binhexa
Super SSH
Author: Jeffery John
Description
Using a Secure Shell (SSH) is going to be pretty important.
Additional details will be available after launching your challenge instance.
Using a Secure Shell (SSH) is going to be pretty important. Can you ssh as ctf-player to titan.picoctf.net at port 60525 to get the flag? You’ll also need the password 6abf4a82. If asked, accept the fingerprint with yes. If your device doesn’t have a shell, you can use: https://webshell.picoctf.org If you’re not sure what a shell is, check out our Primer: https://primer.picoctf.com/#
It was a pretty easy one and one just needs to know how to use basic SSH.
I typed in the command : ssh -p 60525 ctf-player@titan.picoctf.net
And after connecting to the Host I got the flag as : picoCTF{s3cur3_c0nn3ct10n_65a7a106}
Time Machine
Author: Jeffery John
Description
What was I last working on? I remember writing a note to help me remember… You can download the challenge files here:
challenge.zip
At first, I unzipped the file by using the command : unzip challenge.zip
Then I opened the file message.txt in the directory drop-in/ and got the following results :
So, I got a clue that I need to check the history of the file.
Then I tried to see if I could get hidden files and found a directory .git and then I opened it got a directory named logs and after opening it, I found a file named HEAD. And there I got the flag as : picoCTF{t1m3m@ch1n3_8defe16a}
binhexa
Author: Nana Ama Atombo-Sackey
Description
How well can you perfom basic binary operations?
Additional details will be available after launching your challenge instance.
Start searching for the flag here nc titan.picoctf.net 60562
This CTF required some basics of binary and hexadecimal conversions and you could simply get the flag by giving the answers and the flag is : picoCTF{b1tw^3se_0p3eR@tI0n_su33essFuL_d6f8047e}
If you liked the blog, then please provide a Clap to the blog👏.