Magikarp Ground Mission : PicoCTF Walkthrough

Gresecure
3 min readNov 29, 2024

--

Challenge Overview

Initial Analysis

Information about the server , port number and connection command:

Challenge Setup

Tools Used: Linux terminal and basic SSH commands.

Step-by-Step Walkthrough

Step 1: Understanding SSH

SSH (Secure Shell) is a protocol to securely access a remote server. Start by verifying SSH is working on your system by typing:

ssh

This outputs a help guide showing various SSH options.

Output of ssh command

Step 2: Connect to the Server

We are provided with the server’s address and port number. So let’s enter that info on to the terminal.

ssh ctf-player@venus.picoctf.net -p 57586

Here:

  • ctf-player is the username.
  • venus.picoctf.net is the server address.
  • -p 57586 specifies the custom port number.

Step 3: Accept the connection request by accepting ‘yes’.

Type Yes to proceed

Are you sure you want to continue connecting (yes/no/[fingerprint])?

Next, enter the password provided by the challenge.

Output of step 3 command

Step 4: Navigating the Server

Once logged in, list the files in the current directory using ls command

ls

Output:

Step 5: Retrieve the First Flag

Read the content of the first flag file using the cat command:

cat 1of3.flag.txt

The output will show first part of CTF flag.

First part of CTF flag

Step 6: Follow the Instructions

Read the instructions file using cat command

cat instructions-to-2of3.txt

Output:

Step 7 : To move to the root directory, use cd / command

cd /

List files in the root directory using ls

ls

Output:

Step 8: Retrieve the Second Flag

Read the second flag file using cat command

cat 2of3.flag.txt

Output:

Check the next set of instructions

cat instructions-to-3of3.txt

Output:

Step 9: Navigate to the Home Directory

To return to the home directory

cd ~

List files in the home directory

ls

Output:

Step 10: Recover the Final Flag

Read the final flag file using cat command

cat 3of3.flag.txt

Output:

Step 11: Combine the Flag

Combine all parts of the flag retrieved:

  1. picoCTF{xxsh_
  2. 0ut_0f_\/\/4t3r_
  3. 540e4e79}

The complete flag is:

picoCTF{xxsh_0ut_0f_\/\/4t3r_540e4e79}

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Gresecure
Gresecure

Written by Gresecure

Cyber Security | OSINT buff | Digital 4n6 novice| Security& Privacy Aficionado !

No responses yet

Write a response