Free

Challenge: The Base(64)ics

Threat actors commonly use legitimate tools in nefarious ways. As a CTF player, you’ll need to find creative ways to uncover these types of tactics. While evaluating a recent alert in your EDR, you’ve come across a weird string at the end of a powershell command. Can you help figure out what it’s trying to say?
0
30
M
Time
beginner
difficulty
1
ceu/cpe

Course Content

No items found.
Course Description

Base64, base32, and base16... Oh my!

In this challenge, you lean over to your colleague Alice, and she recommends taking a look at a tool called [CyberChef](https://gchq.github.io/CyberChef/). It is an open-sourced web application developed by GCHQ for analyzing and decoding data. Spin it up, and let's learn some basics around Base64.

> 1. What character pads the end of base64 encoded strings? > 2. The base32 alphabet is made up of only __ characters. > 3. Base16 is the same as: > 4. The final flag is: ___ > 5. The string on the course card looks interesting... May need further investigation... Type "Easter Egg" to complete this challenge.

![CySeeker Peculiar](//images.ctfassets.net/kvf8rpi09wgk/qbEzmd4efRzpA1lBEW8vZ/9fb4bc97f855861107cfa48daf666920/CySeeker_Peculiar.png)

Who is this for?

> Early career practitioners. Individuals new to cybersecurity may be challenged but the difficulty rating on this challenge is relatively low.

What resources are available to help solve this challenge?

> Online search, Discord community, colleagues or fellow practitioners.

Are write ups permitted?

> Yes, write ups are permitted; however, please do not post answers directly. All write ups should include an appropriate link back to Cybrary and the Cybrary Course.

This course is part of a Career Path:
No items found.

Instructed by

Senior Instructor
Matthew Mullins

Matt has led multiple Red Team engagements, ranging from a few weeks to a year and covering multiple security domains. Outside of Red Teaming, Matt is also a seasoned penetration tester with interests in: AppSec, OSINT, Hardware, Wifi, Social Engineering, and Physical Security. Matt has a Master's degree in Information Assurance and an exhaustive number of certifications ranging from frameworks, management, and hands-on hacking. Matt is a Technical SME at Cybrary, focusing on Adversarial Emulation and Red Teaming for course content.

Provider
Cybrary Logo
Certification Body
Certificate of Completion

Complete this entire course to earn a Challenge: The Base(64)ics Certificate of Completion