Writeup in progress
Currently making the solution for m00nwalk2and the walkthrough will be published here as soon as it's ready.
Check back soon - or follow our latest updates on the homepage- to be notified when the full writeup goes live.
Currently making the solution for m00nwalk2and the walkthrough will be published here as soon as it's ready.
Check back soon - or follow our latest updates on the homepage- to be notified when the full writeup goes live.
Want more picoCTF 2019 writeups?
A Word document conceals data in invisible whitespace steganography between lines. Extract the hidden characters and decode the flag from the document's formatting.
Forensic disk image with IRC logs, steghide BMPs, slack-space data, and two AES decryptions hidden via golden-ratio-base encoding.
Exploit a timing side-channel in a PIN checker: each correct digit takes slightly longer. Recover all 8 digits.
Extract hidden data from an audio file by analyzing its waveform properties. Decode amplitude values, frequency patterns, or sample data to reveal the encoded flag.
Dig through multiple layers of hidden data in a forensic artifact. Combine techniques like steganography, metadata analysis, and file carving to find the deeply buried flag.