picoCTF General Skills Guide

here's how to solve Tab, Tab, Attack

Back to the General Skills Guides

Tab, Tab, Attack

Name: Tab, Tab, Attack
Description: Using tabcomplete in the Terminal will add years to your life, esp. when dealing with long rambling directory structures and filenames: Addadshashanammu.zip
Author: syreal
Tags: Easy, General Skills, picoCTF 2021
Challenge from: picoCTF 2021
Files: Addadshashanammu.zip
Hints:
1. After `unzip`ing, this problem can be solved with 11 button-presses...(mostly Tab)...

Theory

According to the description, to get the flag we have to do something with the tab autocomplete thing, I really don't know what to expect for this one, so let's just go with it.

Solution

First download and unzip:

shukularuni-picoctf@webshell:~$ wget https://mercury.picoctf.net/static/9689f2b453ad5daeb73ca7534e4d1521/Addadshashanammu.zip
--2025-04-17 01:18:29--  https://mercury.picoctf.net/static/9689f2b453ad5daeb73ca7534e4d1521/Addadshashanammu.zip
Resolving mercury.picoctf.net (mercury.picoctf.net)... 18.189.209.142, ...
Connecting to mercury.picoctf.net (mercury.picoctf.net)|18.189.209.142|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 4519 (4.4K) [application/octet-stream]
Saving to: 'Addadshashanammu.zip'

Addadshashanammu.zip                                                100%[=================================================================================================================================================================>]   4.41K  --.-KB/s    in 0s    

2025-04-17 01:18:30 (1.51 GB/s) - 'Addadshashanammu.zip' saved [4519/4519]

shukularuni-picoctf@webshell:~$ unzip Addadshashanammu.zip

So it seems there's a bunch of folders with weird names, but we can easily do it with tab autocomplete:

shukularuni-picoctf@webshell:~$ cd Addadshashanammu/

shukularuni-picoctf@webshell:~/Addadshashanammu$ ls
Almurbalarammi

shukularuni-picoctf@webshell:~/Addadshashanammu$ cd Almurbalarammi/

shukularuni-picoctf@webshell:~/Addadshashanammu/Almurbalarammi$ ls
Ashalmimilkala

shukularuni-picoctf@webshell:~/Addadshashanammu/Almurbalarammi$ cd Ashalmimilkala/

shukularuni-picoctf@webshell:~/Addadshashanammu/Almurbalarammi/Ashalmimilkala$ ls
Assurnabitashpi

shukularuni-picoctf@webshell:~/Addadshashanammu/Almurbalarammi/Ashalmimilkala$ cd Assurnabitashpi/

shukularuni-picoctf@webshell:~/Addadshashanammu/Almurbalarammi/Ashalmimilkala/Assurnabitashpi$ ls
Maelkashishi

shukularuni-picoctf@webshell:~/Addadshashanammu/Almurbalarammi/Ashalmimilkala/Assurnabitashpi$ cd Maelkashishi/

shukularuni-picoctf@webshell:~/Addadshashanammu/Almurbalarammi/Ashalmimilkala/Assurnabitashpi/Maelkashishi$ ls
Onnissiralis

shukularuni-picoctf@webshell:~/Addadshashanammu/Almurbalarammi/Ashalmimilkala/Assurnabitashpi/Maelkashishi$ cd Onnissiralis/

shukularuni-picoctf@webshell:~/Addadshashanammu/Almurbalarammi/Ashalmimilkala/Assurnabitashpi/Maelkashishi/Onnissiralis$ ls
Ularradallaku

shukularuni-picoctf@webshell:~/Addadshashanammu/Almurbalarammi/Ashalmimilkala/Assurnabitashpi/Maelkashishi/Onnissiralis$ cd Ularradallaku/

shukularuni-picoctf@webshell:~/Addadshashanammu/Almurbalarammi/Ashalmimilkala/Assurnabitashpi/Maelkashishi/Onnissiralis/Ularradallaku$ ls
fang-of-haynekhtnamet

Now that we are in the directory with the executable, let's just give it permissions and run it:

shukularuni-picoctf@webshell:~/Addadshashanammu/Almurbalarammi/Ashalmimilkala/Assurnabitashpi/Maelkashishi/Onnissiralis/Ularradallaku$ chmod +x fang-of-haynekhtnamet 

shukularuni-picoctf@webshell:~/Addadshashanammu/Almurbalarammi/Ashalmimilkala/Assurnabitashpi/Maelkashishi/Onnissiralis/Ularradallaku$ ./fang-of-haynekhtnamet 
*ZAP!* picoCTF{l3v3l_up!_t4k3_4_r35t!_2bcfb2ab}

There we go! That's the flag.

I rated this level as "good"! :3


https://play.picoctf.org/practice/challenge/176