Free
Challenge: Episode II - Attack of the Encoders
Adversaries commonly use encoding, encryption, and hashing to obscure their scripts and attacks. As a CTF player, you will need to analyze alerts and uncover the true nature of a suspicious string embedded in a file. Can you help figure out what it’s trying to say?
1
H
0
M
Time
intermediate
difficulty
1
ceu/cpe
Course Content
No items found.
Course Description
Base64, time to settle the score!
> In this weekly challenge, you are following up on your previous engagement using the help of Alice and her recommended tool, [CyberChef](https://gchq.github.io/CyberChef/). It is an open-sourced web application developed by GCHQ for analyzing and decoding data, with the ability to create complex decoding chains. Spin it up, and let's learn even more about Base64!1. What is the first encoding type? 2. What is the second encoding type? 3. What is the third encoding type? 4. What is the fourth encoding type? 5. What is the fifth encoding type? 6. What is the final flag?
![CySeeker Peculiar](//images.ctfassets.net/kvf8rpi09wgk/qbEzmd4efRzpA1lBEW8vZ/9fb4bc97f855861107cfa48daf666920/CySeeker_Peculiar.png)