Challenge: The Base(64)ics

FREE

Threat actors commonly use legitimate tools in nefarious ways. As a CTF player, you’ll need to find creative ways to uncover these types of tactics. While evaluating a recent alert in your EDR, you’ve come across a weird string at the end of a powershell command. Can you help figure out what it’s trying to say?

Time
30 minutes
Difficulty
Beginner
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Course Content
Encoding is Not Encryption
30m
Course Description

Base64, base32, and base16... Oh my!

In this weekly challenge, you lean over to your colleague Alice, and she recommends taking a look at a tool called CyberChef. It is an open-sourced web application developed by GCHQ for analyzing and decoding data. Spin it up, and let's learn some basics around Base64.

  1. What character pads the end of base64 encoded strings?
  2. The base32 alphabet is made up of only ______ characters.
  3. Base16 is the same as: ________
  4. The final flag is: _______
  5. The string on the course card looks interesting... May need further investigation... Type "Easter Egg" to complete this challenge.

CySeeker Peculiar

Who is this for?

Early career practitioners. Individuals new to cybersecurity may be challenged but the difficulty rating on this challenge is relatively low.

What resources are available to help solve this challenge?

Online search, Discord community, colleagues or fellow practitioners.

Are write ups permitted?

Yes, write ups are permitted; however, please do not post answers directly. All write ups should include an appropriate link back to Cybrary and the Cybrary Course.

Instructed By
Matthew Mullins

Matthew Mullins

Technical Manager, Red Team

Instructor
Provider
Cybrary
Certificate of Completion
Certificate Of Completion

Complete this entire course to earn a Challenge: The Base(64)ics Certificate of Completion