Writeup in progress
Currently making the solution for Ricochetand the walkthrough will be published here as soon as it's ready.
Check back soon - or follow our latest updates on the homepage- to be notified when the full writeup goes live.
Currently making the solution for Ricochetand the walkthrough will be published here as soon as it's ready.
Check back soon - or follow our latest updates on the homepage- to be notified when the full writeup goes live.
Want more picoCTF 2025 writeups?
Advanced Shamir Secret Sharing challenge. Apply a lattice-based attack to recover the secret from insufficient shares.
An AES-keyed dot product server blindly trusts its inputs. Send crafted vectors to leak key bytes via the computed output.
Reconstruct a mathematical structure from partial outputs to activate the flag printer. Apply CRT or polynomial interpolation to solve the system.
Recover multiple AES key bytes using differential power analysis on simulated traces. Correlate power consumption against predicted SubBytes outputs.
Full AES key recovery via DPA on noisier traces. Collect a larger corpus, apply statistical correlation across all 16 bytes, and decrypt the flag.