Forensics 200
Size and string references points to the presence of an embedded rar file.
foremost can be used to extract embedded files. The extracted rar file contains a text file with base64 encoded data. After decoding it 4 times we get a http link to the following link
Size and string references points to the presence of an embedded rar file.
foremost can be used to extract embedded files. The extracted rar file contains a text file with base64 encoded data. After decoding it 4 times we get a http link to the following link
As the hint says the flag can be found under the crown - 'DEsh' [ go left and zoom]
Crypto 200
After a lot of trial and error using cryptool by setting different key lengths, the text seems to be encrypted using Vigenère cipher using key length 2 and the key 'UH'. First round resolves a partial decrypted text containing the word flag. The second round analysis is done on the the encrypted text following the word "flag" with same key and key length. The final key is "this_is_not_hyperelliptic_crypto"
1 comments:
How do you go from `this_vf_not_ulcreryyvcgvp_crypto` to `this_is_not_hyperelliptic_crypto`?
Post a Comment