Ah I was so close for the keygenme challenge. It only gave me 2/3 part of the flag and being the newbie I am in GDB, I didn't know I could do that. Thank you!
The KeygenMe took me so much time and was challenging for me, unlike the other ones. Great video as always! Hopefully the next one would be a pwn walkthrough :P ? Edit: This patch 34:05 is smart! Love it.
nice, for keygenme I just used gef and set a breakpoint on the strcmp. for wizardlike, I was able to redirect the binary to run in a different tmux pane by setting it's tty in an r2 script. found out how to do this on SO. instead of patching the binary I just statically rendered all the map strings with pwntools using the dat offsets from ghidra
somehow can't run the thingy on r2's tty for some reason... gdb tty kinda works but then it is still wonky trying to debug. ended up patching the binary in ghidra :v
Wizardlike I solved similarily just patched with IDA to be able to move everywhere. I see you didn't show how to solve MATRIX, fair enough, took me like 80 hours to solve (long after competition was over).
Yep! They are available in the Pico Gym, along with previous years 😊 You can access the 2022 challenges here: play.picoctf.org/practice?originalEvent=70&page=1
Thanks mate! Here's a screenshot of the theme settings, which I've adapted from a DefCon theme I saw on reddit: imgur.com/a/gCnvq8A Only thing I'd say is when using certain tools, e.g. LinPeas, the colours won't be very helpful (for identifying what is most vulnerable). Best to keep an OG profile that you can quickly swap to when running certain tools 😉