tinyCTF – Misc10

Misc10 Challenge

Misc10 Challenge

The file for this challenge contained an alpha-numeric string. I ran the file contents through a hash identifier and nothing got picked up. Taking a closer look at the string, it looked as though all of the values were within the range of ASCII characters represented in hex (I have to thank my exploit dev training for that!). Decoding the values with Python confirmed my suspicions et voila! My first flag (Figure 1)! 10 points in the bag!

Figure 1 - Decoding hex string.

Figure 1 – Decoding hex string.

Flag: flag{hello_world}

1 thought on “tinyCTF – Misc10

Leave a Reply

Your email address will not be published. Required fields are marked *

The opinions and thoughts on this blog are those of Overflow Security members, and do not reflect those of our members employers.