Free

Challenge: Episode II - Attack of the Encoders

Adversaries commonly use encoding, encryption, and hashing to obscure their scripts and attacks. As a CTF player, you will need to analyze alerts and uncover the true nature of a suspicious string embedded in a file. Can you help figure out what it’s trying to say?
1
0
M
Time
intermediate
difficulty
1
ceu/cpe

Course Content

No items found.
Course Description

Base64, time to settle the score!

> In this weekly challenge, you are following up on your previous engagement using the help of Alice and her recommended tool, [CyberChef](https://gchq.github.io/CyberChef/). It is an open-sourced web application developed by GCHQ for analyzing and decoding data, with the ability to create complex decoding chains. Spin it up, and let's learn even more about Base64!

1. What is the first encoding type? 2. What is the second encoding type? 3. What is the third encoding type? 4. What is the fourth encoding type? 5. What is the fifth encoding type? 6. What is the final flag?

![CySeeker Peculiar](//images.ctfassets.net/kvf8rpi09wgk/qbEzmd4efRzpA1lBEW8vZ/9fb4bc97f855861107cfa48daf666920/CySeeker_Peculiar.png)

Who is this for?

> Early career practitioners. Individuals new to cybersecurity may be challenged but the difficulty rating on this challenge is relatively low. We encourage the use of any internet resources, community/colleague assistance in completion of the challenge.

What resources are available to help solve this challenge?

> Online search, Discord community, colleagues or fellow practitioners.

Are write ups permitted?

> Yes, write ups are permitted; however, please do not post answers directly. All write ups should include an appropriate link back to Cybrary and the Cybrary Course.

This course is part of a Career Path:
No items found.

Instructed by

Senior Instructor
Matthew Mullins

Matt has led multiple Red Team engagements, ranging from a few weeks to a year and covering multiple security domains. Outside of Red Teaming, Matt is also a seasoned penetration tester with interests in: AppSec, OSINT, Hardware, Wifi, Social Engineering, and Physical Security. Matt has a Master's degree in Information Assurance and an exhaustive number of certifications ranging from frameworks, management, and hands-on hacking. Matt is a Technical SME at Cybrary, focusing on Adversarial Emulation and Red Teaming for course content.

Provider
Cybrary Logo
Certification Body
Certificate of Completion

Complete this entire course to earn a Challenge: Episode II - Attack of the Encoders Certificate of Completion