Writeup in progress
Currently making the solution for Invisible WORDsand the walkthrough will be published here as soon as it's ready.
Check back soon - or follow our latest updates on the homepage- to be notified when the full writeup goes live.
Currently making the solution for Invisible WORDsand the walkthrough will be published here as soon as it's ready.
Check back soon - or follow our latest updates on the homepage- to be notified when the full writeup goes live.
Want more picoCTF 2023 writeups?
Exploit a timing side-channel in a PIN checker: each correct digit takes slightly longer. Recover all 8 digits.
Extract hidden data from an audio file by analyzing its waveform properties. Decode amplitude values, frequency patterns, or sample data to reveal the encoded flag.
Dig through multiple layers of hidden data in a forensic artifact. Combine techniques like steganography, metadata analysis, and file carving to find the deeply buried flag.
Analyze a set of files and directory structures to locate hidden forensic artifacts. Piece together data fragments scattered across the archive to assemble the flag.
Reverse an encoder binary that transforms the flag into a custom encoding scheme before writing it to an output file. Decode the output to recover the flag.