Challenge: The Base(64)ics
Threat actors commonly use legitimate tools in nefarious ways. As a CTF player, you’ll need to find creative ways to uncover these types of tactics. While evaluating a recent alert in your EDR, you’ve come across a weird string at the end of a powershell command. Can you help figure out what it’s trying to say?
Already have an account? Sign In »
Module 1: Identify
Base64, base32, and base16... Oh my!
In this weekly challenge, you lean over to your colleague Alice, and she recommends taking a look at a tool called CyberChef. It is an open-sourced web application developed by GCHQ for analyzing and decoding data. Spin it up, and let's learn some basics around Base64.
- What character pads the end of base64 encoded strings?
- The base32 alphabet is made up of only ______ characters.
- Base16 is the same as: ________
- The final flag is: _______
- The string on the course card looks interesting... May need further investigation... Type "Easter Egg" to complete this challenge.
Who is this for?
Early career practitioners. Individuals new to cybersecurity may be challenged but the difficulty rating on this challenge is relatively low.
What resources are available to help solve this challenge?
Online search, Discord community, colleagues or fellow practitioners.
Are write ups permitted?
Yes, write ups are permitted; however, please do not post answers directly. All write ups should include an appropriate link back to Cybrary and the Cybrary Course.
Technical Manager, Red Team
Complete this entire course to earn a Challenge: The Base(64)ics Certificate of Completion