๐ฏ FANTASY CTF
A detailed write-up of the Misc challenge 'FANTASY CTF' from PicoCTF - 2025
๐ Challenge Overview
Category Details Additional Info ๐ Event PicoCTF - 2025 Event Link ๐ฐ Category Misc ๐ฏ ๐ Points 10 Out of 500 total โญ Difficulty ๐ข Easy Personal Rating: 0/10 ๐ค Author syreal Profile ๐ฎ Solves (At the time of flag submission) 7.312 solve rate ๐ Date 15-03-2025 PicoCTF - 2025 ๐ฆพ Solved By mH4ck3r0n3 Team:
๐ Challenge Information
Play this short game to get familiar with terminal applications and some of the most important rules in scope for picoCTF. Connect to the program with netcat: $ nc verbal-sleep.picoctf.net 55716
๐ฏ Challenge Files & Infrastructure
Provided Files
1
Files: None
๐ Initial Analysis
First Steps
The first thing I did was connect with
netcat
:Since the process is already
"exploitation"
, let’s move on to the next phase.
๐ฏ Solution Path
Exploitation Steps
Exploitation
I continued pressing
enter
until I received a prompt. I selectedc
(though I think itโs pretty much indifferent, even though I didnโt try honestly), and then we are asked to play a game by selectinga
. Once selected, after a fewenter
presses, the flag is printed.
Flag capture
๐ ๏ธ Exploitation Process
Approach
The automatic exploit performs exactly the same steps as manually, by connecting to the server, and extracts the flag from the response using a regex.
๐ฉ Flag Capture
FlagpicoCTF{m1113n1um_3d1710n_fc649bc5}
Proof of Execution
๐ง Tools Used
Tool Purpose Python Exploit
๐ก Key Learnings
Skills Improved
- Binary Exploitation
- Reverse Engineering
- Web Exploitation
- Cryptography
- Forensics
- OSINT
- Miscellaneous
๐ Final Statistics
Metric | Value | Notes |
---|---|---|
Time to Solve | 00:01 | From start to flag |
Global Ranking (At the time of flag submission) | 1173/10516 | Challenge ranking |
Points Earned | 10 | Team contribution |
Created: 15-03-2025 โข Last Modified: 15-03-2025 *Author: mH4ck3r0n3 โข Team: *