Writeup in progress
Currently making the solution for flag_printerand the walkthrough will be published here as soon as it's ready.
Check back soon - or follow our latest updates on the homepage- to be notified when the full writeup goes live.
Currently making the solution for flag_printerand the walkthrough will be published here as soon as it's ready.
Check back soon - or follow our latest updates on the homepage- to be notified when the full writeup goes live.
Want more picoCTF 2024 writeups?
Advanced Shamir Secret Sharing challenge. Apply a lattice-based attack to recover the secret from insufficient shares.
An AES-keyed dot product server blindly trusts its inputs. Send crafted vectors to leak key bytes via the computed output.
ChaCha20-Poly1305 is only safe when used correctly. Tamper with the ciphertext to violate integrity guarantees.
A multi-layer cryptographic challenge. Analyze each bounced encoding step and reverse all transformations to recover the flag.
Recover multiple AES key bytes using differential power analysis on simulated traces. Correlate power consumption against predicted SubBytes outputs.