mirror of
https://git.qwik.space/left4code/L4C_Forensics_CTF.git
synced 2025-07-28 00:14:28 +05:30
HashMash
This commit is contained in:
@@ -0,0 +1 @@
|
||||
<EFBFBD>
|
52
Filesystem Imaging & hashing/hashing/CTF_HashMash/README.md
Normal file
52
Filesystem Imaging & hashing/hashing/CTF_HashMash/README.md
Normal file
@@ -0,0 +1,52 @@
|
||||
# Hash Forensics CTF
|
||||
|
||||
**[Challenge (HashMash)]**
|
||||
|
||||
To complete this CTF, you can use hashcat and hashid and their subsequent guides:
|
||||
|
||||
[hashcat](https://left4code.neocities.org/courses/hash_forensics/hashcat.html)
|
||||
|
||||
[hashid](https://left4code.neocities.org/courses/hash_forensics/hashid.html)
|
||||
|
||||
**1)** Download this repository:
|
||||
|
||||
##### **git clone https://git.qwik.space/left4code/L4C_Forensics_CTF**
|
||||
|
||||
**2)** Run the linux executable ELF file inside of the "Filesystem Imaging & hashing" directory.
|
||||
|
||||
##### **./hashcat_ctf**
|
||||
|
||||
**3)** Go to the terminal in the house.
|
||||
|
||||
|
||||
**4)** Copy the hash
|
||||
|
||||
|
||||
**5)** Use hashID to determine what kind of hash is being used.
|
||||
|
||||
|
||||
**6)** properly format and place it into hashcat as a hashfile
|
||||
|
||||
|
||||
**7)** Successfully find the password corresponding to each of the three hashes to get the password
|
||||
|
||||
|
||||
**8)** Use the password to decrypt the text file and get the flag.
|
||||
|
||||
|
||||
**NOTE** Do you want the source code?
|
||||
|
||||
Upon completing the game, the same password used to get the flag can be used to decrypt the source_code_encrypted.zip.gpg file.
|
||||
|
||||
To build the project, cd into the source_code_encrypted/ directory and run the command:
|
||||
|
||||
#### **make**
|
||||
- will make the project
|
||||
|
||||
#### **make run**
|
||||
- will run the executable
|
||||
|
||||
#### **make clean**
|
||||
- will remove the executable
|
||||
|
||||
If you can't complete the CTF and still want the code, send me an [email](https://left4code.neocities.org/left4code_gpg.txt) and I'll send you the zip file with the code in it. Pretty please send me your gpg key first though so I can encrypt before sending.
|
Binary file not shown.
@@ -1,6 +1,9 @@
|
||||
|
||||
# Metadata Forensics CTF
|
||||
|
||||
**[LEARNING]**
|
||||
Learning for this CTF can be done in the [digital forensics section of left4code.neocities.org](https://left4code.neocities.org/courses/digital_forensics)
|
||||
|
||||
**[Challenge (BKFLAG)]**
|
||||
|
||||
Let's have a little throw back to 2012 when the bkfl image showed up on a little web forum back in the day. It has the metadata and GPS location in it still (Cartwheel76 and Zubes, thank you!). To complete this challenge, follow these guidelines (or don't, figure something else out that solidifies all this learning!)
|
||||
|
Reference in New Issue
Block a user