https://play.picoctf.org/practice/challenge/64?page=1&search=caesarpicoCTF{ynkooejcpdanqxeykjrbdofgkq}카이사르 관련 툴을 사용해도 되지만 괜한 오기가 생겨 직접 풀이 코드를 작성했
https://play.picoctf.org/practice/challenge/253?page=1&search=basic-modTake each number mod 37 and map it to the following character set: 0-25 is
https://play.picoctf.org/practice/challenge/254?page=1&search=basic-modTake each number mod 41 and find the modular inverse for the result. Then
A message has come in but it seems to be all scrambled. Luckily it seems to have the key at the beginning. Can you crack this substitution cipher? ![]
https://play.picoctf.org/practice/challenge/308?page=1&search=substitutionA second message has come in the mail, and it seems almost identical to
https://play.picoctf.org/practice/challenge/309?page=1&search=substitutionIt seems that another encrypted message has been intercepted. The encry
https://play.picoctf.org/practice/challenge/312?page=1&search=transpositionOur data got corrupted on the way here. Luckily, nothing got replaced,
We found a brand new type of encryption, can you break the secret code?mlnklfnknljflfjljnjijjmmjkmljnjhmhjgjnjjjmmkjjmijhmkjhjpmkmkmljkjijnjpmhmjjgjjh
https://play.picoctf.org/practice/challenge/18?category=1&page=1잘만 살펴보면 크게 어렵지 않은 문제였다.홈페이지의 HTML 코드 먼저 검사해보았다.라는 문구 발견!그렇다면 나머지 CSS와 JS에도 조금씩의 힌
https://play.picoctf.org/practice/challenge/200?category=1&page=1HTML과 CSS 소스에는 크게 중요한 내용이 없다고 판단하였다.JS 소스 코드를 보자.username은 YWRtaW4와,password는 cG
https://play.picoctf.org/practice/challenge/66?category=1&page=1위 사진을 보면 정답을 보란듯이 드러내고 있다.그냥 순서대로 입력하면 그게 정답이다.그래도 조금만 더 분석해보자.checkpass는 id가 'pa
문제 https://play.picoctf.org/practice/challenge/4?category=1&page=1&search= > **Hints** : What part of the website could tell you where the creator doe
문제 https://play.picoctf.org/practice/challenge/173?category=1&page=1&search= 풀이 해결 과정 가장 먼저 홈을 실행했을 때의 화면이다. 쿠키 문제라서 쿠키를 확인해주니 name = -1 라는 쿠키가 있었다.