PICO Linux Challs
Magikarp Ground Mission
We can connect to the machine via SSH and then authenticate with a password.
Then if we type ls and cat the “1of3.flag.txt” file, we get the first part of the flag. We can then follow the same procedure for “instructions-to-2of3.txt”.
This tells: “Next, go to the root of all things, more succinctly /”.
This can be done with cd /. We then follow with ls to see the contents of the directory. Here we can find “2of3.flag.txt” that we can then cat to get the next part of the flag.
We can also cat the “instructions-to-3of3.txt” file and the contents say “Lastly, ctf-player, go home… more succinctly ~”
If we do cd or cd ~ we can find the “3of3.flag.txt” file and then cat that to get the last part of the flag.
First Grep
We can download the file using wget and then run file on the file to see that it is an ASCII/plaintext text file.
We can then use egrep or grep followed by the regex: “picoCTF” to find a string that contains “picoCTF” which is the prefix flag format.
This provides us with the flag.
First Find
For this challenge we download a zip file (you can tell by the extension). If we run file on the file, this confirms that it is a zip file.
We can then extract the zip file using unzip files.zip
To find the “uber-secret.txt” file we can simply run find . -name uber-secret.txt from the directory where we extracted the zip file to.
This shows us that the “uber-secret.txt” resides in the path “files/adequate_books/more_books/.secret/deeper_secrets/deepest_secrets/uber-secret.txt”.
We can then run cd files/adequate_books/more_books/.secret/deeper_secrets/deepest_secrets and then run cat uber-secret.txt to find the flag.
Also remember to show hidden files run ls -al instead of ls -l or ls.