The Nen-Book
LinkedinTwitterMediumGithubHTB
  • Whoami
  • Walkthroughs & Writeups
    • My CTF Methodology
    • Hack The Box Machines
      • Administrator
      • Escape two
      • Cicada
      • HTB Permx Machine(CVE-2023–4220 Chamilo LMS)
    • Intigriti 1337Up 2024
      • Intigriti 1337Up 2024-CTF OSINT Challenges
      • Intigriti 1337Up Live 2024-CTF Web Challenges
    • CyCTF Quals 2024
      • OSINT Challenges CyCTF Quals 2024
      • Old Friend OSINT Challenge CyCTF 2024 Quals Writeup
    • PicoCTF
      • PicoCTF 2024 Web Exploitation Challenges
      • PicoCTF 2024 General Skills Challenges
      • PicoCTF 2021 Web Exploitation Challenges Walkthrough
      • PicoCTF 2019 Web Exploitation Challenges
  • Web_AppSec
    • Web_Recon
    • SQli
    • ATO
    • Backend_Technology_Tricks
    • XSS
    • SSRF
    • CSRF
    • XXE
    • SSTI
    • Insecure_Deserialization
    • Open_Redirects
    • Information_Disclosures
    • Rate_Limiting
    • Clickjacking
    • Broken Access Control & IDORS
    • Bash_Scripting
    • Authentication_Vulnerabilities
    • App_Logic_Errors
  • Network & AD Pentesting
    • Scanning & Enumeration
    • Active_Directory
      • AD_Overview_&_ Lab Build
      • AD_Initial_Attack_Vectors
      • AD_Post-Compromise_Enumeration
      • AD_Post-Compromise_Attacks
    • Buffer_Overflow_Attacks
    • Web_Applications
    • Privilege_Escalation
  • Cloud_Security
    • AWS Pentesting
  • APISec
    • API_Recon
    • Broken_Access_Control & Info_Leaks
  • Code_Review
    • Source_Code_Review_101
    • Code Review Tools
  • Bug_Hunting
    • Picking_A_BugBounty_Program
    • Writing_A_Good_Report
  • MITRE ATT&CK
    • Introducing the ATT&CK Framework
    • MITRE Engenuity
    • Threat-Informed Defense
Powered by GitBook
On this page
  • بِسْمِ اللهِ الرَّحْمٰنِ الرَّحِيْمِ
  • Super SSH
  • Commitment Issues
  • Time Machine

Was this helpful?

Edit on GitHub
  1. Walkthroughs & Writeups
  2. PicoCTF

PicoCTF 2024 General Skills Challenges

PreviousPicoCTF 2024 Web Exploitation ChallengesNextPicoCTF 2021 Web Exploitation Challenges Walkthrough

Last updated 5 months ago

Was this helpful?

بِسْمِ اللهِ الرَّحْمٰنِ الرَّحِيْمِ

Free Palestine, Free Gaza

Hello and welcome again, I’m Ahmed Reda (0xHunterr) and this is a walkthrough for some of the Web Exploitation & General Skills Challenges of PicoCTF 2024 Live

Super SSH

It’s just about connecting through SSH, we can solve it using the following command: ssh -p 50832 [ctf-player@titan.picoctf.net](mailto:ctf-player@titan.picoctf.net)

the flag : picoCTF{s3cur3_c0nn3ct10n_07a987ac}

Commitment Issues

provided with a Zipped file to download, after unzipping it I got the following unzip challenge.zip

the challenge folder contains a message.txt file

the hints of the challenge are talking about git commits so checked the git log

we can see that the first commit has the message that says “remove sensitive info“ so that’s exactly what we are looking for, let’s revert that commit

git checkout ef0b7cc6b98367fa168573c931e0f7098ef59182

now let’s read the file before deleting the sensitive info

the flag: picoCTF{s@n1t1z3_cf09a485}

Time Machine

so after downloading the file and unzipping it we got :

wow, this was pretty fast☹ ..anyway the flag: picoCTF{t1m3m@ch1n3_8defe16a}

that’s it for this CTF see you in the future Inshaa Allah, Pray for me 🙏

If you have any questions, You can reach me through my social accounts:

“Hide the Pain”

Challenge

Twitter(X): Linkedin: Facebook:

Link
https://twitter.com/HunterXReda
https://www.linkedin.com/
https://www.facebook.com/profile.php?id=100012814653588