Skip to content
This repository was archived by the owner on Apr 13, 2025. It is now read-only.
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
11 changes: 11 additions & 0 deletions Assignment_1/1.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
i=0
str="HACK"
while read line
do
i=$((i+1))
if [[ $line == *"$str"* ]];
then
echo " The word is present in line no. $i"
echo " $line"
fi
done < i_am_hiding_stuff.txt
11 changes: 11 additions & 0 deletions Assignment_1/3.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
i=0
str="8080"
while read line
do
i=$((i+1))
if [[ $line == *"$str"* ]];
then
echo "The link is in line no. $i and the link is given below"
echo " $line"
fi
done < i_am_hiding_stuff.txt
11 changes: 11 additions & 0 deletions Assignment_1/4.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
i=0
str="HACK"
while read line
do
i=$((i+1))
if [[ $line == *"hackIT"* ]];
then
echo " line no. is $i and the line is given below:"
echo $line
fi
done <i_am_hiding_stuff.txt
10 changes: 10 additions & 0 deletions Assignment_2/210029_Abhinav_Garg/cookies.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
# Cookies

## Approach

- I started with the burpsuite intercept feature, and used it to intercept information as I entered snickerdoodle or wafer.
- As Burpsuite displayed various information on each step, I noticed that the "Cookie: name=X" element where X was a number which was varying with my input, hence I started changing it manually to obtain the flag for name=18.

## Flag

-picoCTF{3v3ry1_l0v3s_c00k135_064663be}
9 changes: 9 additions & 0 deletions Assignment_2/210029_Abhinav_Garg/get_ahead.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
# GET aHEAD

## Approach

- The problem takes method requests of GET and POST. I used BurpSuite to intercept the requests and tried changing the method to HEAD. It lead to an empty screen. Hence, I tried interceptiong the server responses as well for the HEAD method and successfully obtained the flag.

## Flag

- picoCTF{r3j3ct_th3_du4l1ty_cca66bd3}
10 changes: 10 additions & 0 deletions Assignment_2/210029_Abhinav_Garg/inspector.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
# Insp3ct0r

## Approach

- By now, it was pretty clear that the name of the problem is a pun, a hint to the solution.
- Hence, I inspect the code and the flag was present as comment in the html, css and js file cut into three parts, one part of the flag in each file.

## Flag

- picoCTF{tru3_d3t3ct1ve_0r_ju5t_lucky?2e7b23e3}
3 changes: 3 additions & 0 deletions Assignment_2/210029_Abhinav_Garg/logon.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
logon

picoCTF{th3_c0nsp1r4cy_l1v3s_0c98aacc}
13 changes: 13 additions & 0 deletions Assignment_2/210029_Abhinav_Garg/scavenger_hunt.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
# Scavenger Hunt

## Approach

- So I started with inspecting the code.
- Got the first part in index.html
- Got the second part in the css file
- Tried searching for the third part in the .js file but it contained the clue to the third part.
- Hence, found the remaining flags in /robots.txt, /.htaccess, /.DS_Store following the clues along the way.

## Flag

- picoCTF{th4ts_4_l0t_0f_pl4c3s_2_lO0k_f7ce8828}
12 changes: 12 additions & 0 deletions Assignment_2/210029_Abhinav_Garg/some_assembly_required_1.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
# Some Assembly Required 1

## Approach

- inspected the js file
- found ./JIFxzHyW8W which in essentially means a file inside this directory, hence tried to open it by updating the link.
- the updated link dowloads a .txt file
- the flag is visible inside the file

## Flag

- picoCTF{8857462f9e30faae4d037e5e25fee1ce}
11 changes: 11 additions & 0 deletions Assignment_2/210029_Abhinav_Garg/where_are_the_robots.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
# where are the robots

## Approach

- from the title and the content on the website it seemed very obvious to look into the robots.txt file
- it contains further file where they dont want you to look (as it says on the page)
- add that /1bb4c.html to the link to find the flag

## Flag

- picoCTF{ca1cu1at1ng_Mach1n3s_1bb4c}