Challenge: Episode II - Attack of the Encoders
Adversaries commonly use encoding, encryption, and hashing to obscure their scripts and attacks. As a CTF player, you will need to analyze alerts and uncover the true nature of a suspicious string embedded in a file. Can you help figure out what it’s trying to say?
Already have an account? Sign In »

Module 1: Encoding Schemes
Base64, time to settle the score!
In this weekly challenge, you are following up on your previous engagement using the help of Alice and her recommended tool, CyberChef. It is an open-sourced web application developed by GCHQ for analyzing and decoding data, with the ability to create complex decoding chains. Spin it up, and let's learn even more about Base64!
- What is the first encoding type?
- What is the second encoding type?
- What is the third encoding type?
- What is the fourth encoding type?
- What is the fifth encoding type?
- What is the final flag?
Who is this for?
Early career practitioners. Individuals new to cybersecurity may be challenged but the difficulty rating on this challenge is relatively low. We encourage the use of any internet resources, community/colleague assistance in completion of the challenge.
What resources are available to help solve this challenge?
Online search, Discord community, colleagues or fellow practitioners.
Are write ups permitted?
Yes, write ups are permitted; however, please do not post answers directly. All write ups should include an appropriate link back to Cybrary and the Cybrary Course.

Matthew Mullins
Technical Manager, Red Team


Complete this entire course to earn a Challenge: Episode II - Attack of the Encoders Certificate of Completion