Weekly Challenge: Episode II - Attack of the Encoders

Cybrary
Course

Adversaries commonly use encoding, encryption, and hashing to obscure their scripts and attacks. As a CTF player, you will need to analyze alerts and uncover the true nature of a suspicious string embedded in a file. Can you help figure out what it’s trying to say?

Time
1 hour
Difficulty
Intermediate
CEU/CPE
1
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Course Content
Module 1: Encoding Schemes
Analyzing and Decoding Data
1h
Course Description

Base64, time to settle the score!

In this weekly challenge, you are following up on your previous engagement using the help of Alice and her recommended tool, CyberChef. It is an open-sourced web application developed by GCHQ for analyzing and decoding data, with the ability to create complex decoding chains. Spin it up, and let's learn even more about Base64!

  1. What is the first encoding type?
  2. What is the second encoding type?
  3. What is the third encoding type?
  4. What is the fourth encoding type?
  5. What is the fifth encoding type?
  6. What is the final flag?

CySeeker Peculiar

Who is this for?

Early career practitioners. Individuals new to cybersecurity may be challenged but the difficulty rating on this challenge is relatively low. We encourage the use of any internet resources, community/colleague assistance in completion of the challenge.

What resources are available to help solve this challenge?

Online search, Discord community, colleagues or fellow practitioners.

Are write ups permitted?

Yes, write ups are permitted; however, please do not post answers directly. All write ups should include an appropriate link back to Cybrary and the Cybrary Course.

Instructed By
Matthew Mullins
Matthew Mullins
Technical Manager, Red Team
Instructor
Provider
Cybrary
Certificate of Completion
Certificate Of Completion

Complete this entire course to earn a Weekly Challenge: Episode II - Attack of the Encoders Certificate of Completion