Number Based Decoding - 8l4ckh4t
n1nj4
Key - r00t
Bad Event - USA
Going Home
Message - m4st3r
Decoding Flags - m4dh4t
Bad Event - China
63 68 61 72 67 65 20 2E 30 33 20 62 69 74 63 6F 69 6E 2066 6F 72 20 64 65 63 72 79 70 74 20 6B 65 79 73
Created by Nick F.
Looks like hex, lets chuck it into CyberChef:
Answer:
charge .03 bitcoin for decrypt keys
This message appears to be a password and seems to be obfuscated using a popular cryptographic algorithm: NDgyYzgxMWRhNWQ1YjRiYzZkNDk3ZmZhOTg0OTFlMzg=
Created by Nick F.
The =
hints there's base64 padding, meaning that this is a base64 encoded string.
Lets chuck it into CyberChef again:
Though now we get 482c811da5d5b4bc6d497ffa98491e38
which doesn't seem like a flag. Instead it looks like a hash.
┌──(kali㉿kali)-[~]
└─$ hash-identifier 482c811da5d5b4bc6d497ffa98491e38
#########################################################################
# __ __ __ ______ _____ #
# /\ \/\ \ /\ \ /\__ _\ /\ _ `\ #
# \ \ \_\ \ __ ____ \ \ \___ \/_/\ \/ \ \ \/\ \ #
# \ \ _ \ /'__`\ / ,__\ \ \ _ `\ \ \ \ \ \ \ \ \ #
# \ \ \ \ \/\ \_\ \_/\__, `\ \ \ \ \ \ \_\ \__ \ \ \_\ \ #
# \ \_\ \_\ \___ \_\/\____/ \ \_\ \_\ /\_____\ \ \____/ #
# \/_/\/_/\/__/\/_/\/___/ \/_/\/_/ \/_____/ \/___/ v1.2 #
# By Zion3R #
# www.Blackploit.com #
# [email protected] #
#########################################################################
--------------------------------------------------
Possible Hashs:
[+] MD5
[+] Domain Cached Credentials - MD4(MD4(($pass)).(strtolower($username)))
Least Possible Hashs:
...
I was right, its a MD5
hash. But since MD5 is a one-way hash, it would take a while to brute force it. But checking online I found a database checker has stored common MD5 hashes and their values.
And we have our flag:
password123
Our analysts at the SOC command center have discovered a few files and believe they are related to one another. First, figure out what the first set of numbers mean. This file was labeled “KEY.”
75 6E 6272 65 61 6B 61 62 6C 65 52 53 41
Created by Nick F.
Looks like Hex, lets chuck it into CyberChef:
Answer:
unbreakableRSA
Our analysts at the SOC command center have noticed that the same block of emojis has been showing up in hacker communications. Analysts believe they are using emojis to represent important information.
Created by Nick F.
Given this image, we need to obtain a flag:
The emojis used are:
🦵 - 208 - U+1F9B5
😰 - 87 - U+1F630
🤍 - 149 - U+1F90D
👵 - 250 - U+1F475
Hmm, four periods and some emoji codes? Sounds like an ip address...
Submission:
208.87.149.250
Our analysts at the SOC command center have noticed that the same block of emojis has been showing up in hacker communications. Analysts believe they are using emojis to represent important information.
Created by Nick F.
Another emoji file:
Emojis are:
💋 - 127 - U+1F48B
😀 - 1 - U+1F600
Converting into an ip address:
127.0.0.1
After deciphering the “KEY,” move on and use this information to help solve the second related message. The message allegedly contains a high-value target address and the sooner we figure it out the better!
bnVmIGtlcnFldSB0dyBjZ2N1Z2Z1IGV0IDk4MDAgY2F3bGt2IGpk
Created by Nick F.
Throwing this into CyberChef, I can see a high entropy from decoding with Base64:
Looks like a Vigenere cipher, lets try it with the key we got previously in Key - r00t
:
And we got our flag:
the target is located at 9800 savage rd
Our analysts at the SOC command center have found some pictures that are hiding a flag. They need help decoding the message. Created by Nick F.
So given this image, we need to obtain a flag:
These look like nautical signalling flags, so lets find an online dictionary to help us:
Comparing the two I got the flag, Answer:
flag_cyber_5946
Our analysts at the SOC command center have noticed that the same block of emojis has been showing up in hacker communications. Analysts believe they are using emojis to represent important information.
Created by Nick F.
Another emoji set we need to decode:
The emojis used are:
✍ - 202 - U+270D
👻 - 111 - U+1F47B
🤏 - 175 - U+1F90F
🤭 - 31 - U+1F92D
Just like last time, four periods seems like an ip address. Decoding this gives us:
202.111.175.31