# picoCTF2025 Write-up [TOC] ## General Skills ### Fantasy CTF -10pt 太簡單了,懶得說 ![image](https://hackmd.io/_uploads/HJhiKaooke.png) ### Rust fixme 1 -100pt cargo -> 一種 git ![image](https://hackmd.io/_uploads/rJej5WHh1g.png) 用 ```cargo run main.js``` 去跑,出現了以下的錯誤 ![image](https://hackmd.io/_uploads/rkaxobrnkg.png) 1. 沒加 ```;``` 2. 26行有兩個錯誤,一個是 println的用法有誤,一個是多加了 ```&```,改成 ```println!("String::from_utf8{:?}",String::from_utf8(decrypted_buffer));``` 3. 改成 ```return``` ### Rust fixme 2 -100pt ![image](https://hackmd.io/_uploads/HkoLkMSnye.png) 跑起來的錯誤如下 ![image](https://hackmd.io/_uploads/r1EYJMShke.png) 新增這一行,我不知道為什麼 XD ![image](https://hackmd.io/_uploads/SknokGB21l.png) ### Rust fixme 3 -100pt ![image](https://hackmd.io/_uploads/Sy2gZfShJx.png) 錯誤訊息如下 ![image](https://hackmd.io/_uploads/r1gGWMBnJx.png) Code長這樣,拿掉 unsafe function的註解 ![螢幕擷取畫面 2025-03-17 110511](https://hackmd.io/_uploads/Hk-YZzB2Jg.jpg) ## Web ### Cookie Monster Secret Recipe -50pt ![image](https://hackmd.io/_uploads/BkU-q6ji1g.png) 點開網站長這樣 ![2025-03-10 10 11 25](https://hackmd.io/_uploads/H1PFcajj1x.png) 先隨便輸入帳號密碼觀察一下,回應說他要 COOKIES!! ![2025-03-10 10 12 58](https://hackmd.io/_uploads/H1Meoajjkl.png) 在 Cookie 中,發現長得很像 Base64 的東西,將它解碼就是 flag 了 ![2025-03-10 10 15 02](https://hackmd.io/_uploads/Bky_opss1g.png) ## For ### Ph4nt0m 1ntrud3r -50pt ![image](https://hackmd.io/_uploads/BkkYJf3oJx.png) 打開 Wireshark 後,發現 Len=12 的裡面帶有 base64,將每個 base64 串再一起就是答案了 ![image](https://hackmd.io/_uploads/rJi01f3iye.png) ## Crypto ### hashcrack -100pt ![image](https://hackmd.io/_uploads/ByL6Gfr2kg.png) ![image](https://hackmd.io/_uploads/BkhxmGH3kx.png) ### EVEN RSA CAN BE BROKEN??? -200pt