18 Oct 2022
An integer can be converted to string by Itoa
function which is in strconv
library.
Example :
import (
"fmt"
"reflect"
"strconv"
)
func main() {
nums1 := 10
fmt.Println(nums1, reflect.TypeOf(nums1))
str := strconv.Itoa(nums1)
fmt.Println(str, reflect.TypeOf(str))
}
06 Oct 2022
I encounter below error when run command anchor build
.
error[E0635]: unknown feature `proc_macro_span_shrink`
Solution is downgrading proc-macro2 to 1.0.43 :
cargo update -p proc-macro2 --precise 1.0.43
Reference
29 Sep 2022
PicoGym Exclusive / Forensics
Description
I thought that my password was super-secret, but it turns out that passwords passed over the AIR can be CRACKED, especially if I used the same wireless network password as one in the rockyou.txt credential dump.
Use this ‘pcap file’ and the rockyou wordlist. The flag should be entered in the picoCTF{XXXXXX} format.
Prereguisite
Aircrack-Ng, which is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.
Writeup
- Download the pcap file and rockyou wordlist.
- Crack
aircrack-ng -w rockyou.txt wpa-ing_out.pcap
![](https://i.imgur.com/tYfNhdU.png)
28 Sep 2022
PicoCTF 2019 / Forensics
Description
We found this packet capture and key. Recover the flag.
Prereguisite
ssldump, which is an SSL/TLS network protocol analyzer.
Writeup
- Download packet capture and key.
ssldump -r capture.pcap -k picopico.key -d > output
vim output
- Search our flag.
![](https://i.imgur.com/hOnRO0H.png)
28 Sep 2022
PicoCTF 2019 / Forensics
Description
We found this packet capture and key. Recover the flag.
Writeup
- Download packet capture and key.
- Use Wireshark to open packet capture.
- Prefrence > Protocal > TLS > RSA key list edit > add key we download.
- Analysis TLS stream.
![](https://i.imgur.com/cn12Nee.png)
Reference
Decrypting TLS Streams With Wireshark: Part 1