picoCTF gamifies learning hacking with capture-the-flag puzzles created by trusted computer security and privacy experts at Carnegie Mellon University (picoCTF - CMU Cybersecurity Competition, n.d.).
The challenges are categorised into 6 categories: Web Exploitation
, Cryptography, Reverse Engineering
, Forensics, General Skills and Binary Exploitation
.
Forensics
- easy
- medium
- PcapPoisoning
- hideme
- Sleuthkit Intro
- FindAndOpen
- St3g0
- Sleuthkit Apprentice
- Redaction gone wrong
- Packets Primer
- Lookey here
- Operation Oni
- File types
- Enhance!
- MacroHard WeakEdge
- Disk Disk Sleuth II
- Matryoshka doll
- Wireshark Doo Dooo Do Doo…
- Disk Disk Sleuth
- What Lies Within
- advanced-potion-making
- extensions
- So Meta
- shark on a wire 1
- WPA-ing Out
- Operation Orchid
- Trivial Flag Transfer Protocol
- WhitePages
- Mob psycho
- endianness-v2
Cryptography
- easy
- medium
General Skills
- easy
- Binary Search
- Time Machine
- Super SSH
- endianness
- Big Zip
- First Find
- repetitions
- Commitment Issues
- PW Crack 1
- PW Crack 2
- HashingJobApp
- runme.py
- Glitchcat
- Tab, Tab, Attack
- strings it
- Bases
- Wave a flag
- Python Wrangling
- Static ain’t always noise
- Nice netcat…
- Obedient Cat
- 2Warm
- First Grep
- binhexa
- fixme1.py
- fixme2.py
- Collaborative Development
- Blame Game
- convertme.py
- Codebook
- Magikarp Ground Mission
- Warmed Up
- what’s a net cat
- Lets Warm Up
- medium
References
- picoCTF - CMU Cybersecurity Competition. (n.d.). https://picoctf.org/