mirror of
https://git.qwik.space/left4code/L4C_Forensics_CTF.git
synced 2025-07-28 00:14:28 +05:30
HashMash
This commit is contained in:
@@ -0,0 +1 @@
|
||||
<EFBFBD>
|
52
Filesystem Imaging & hashing/hashing/CTF_HashMash/README.md
Normal file
52
Filesystem Imaging & hashing/hashing/CTF_HashMash/README.md
Normal file
@@ -0,0 +1,52 @@
|
||||
# Hash Forensics CTF
|
||||
|
||||
**[Challenge (HashMash)]**
|
||||
|
||||
To complete this CTF, you can use hashcat and hashid and their subsequent guides:
|
||||
|
||||
[hashcat](https://left4code.neocities.org/courses/hash_forensics/hashcat.html)
|
||||
|
||||
[hashid](https://left4code.neocities.org/courses/hash_forensics/hashid.html)
|
||||
|
||||
**1)** Download this repository:
|
||||
|
||||
##### **git clone https://git.qwik.space/left4code/L4C_Forensics_CTF**
|
||||
|
||||
**2)** Run the linux executable ELF file inside of the "Filesystem Imaging & hashing" directory.
|
||||
|
||||
##### **./hashcat_ctf**
|
||||
|
||||
**3)** Go to the terminal in the house.
|
||||
|
||||
|
||||
**4)** Copy the hash
|
||||
|
||||
|
||||
**5)** Use hashID to determine what kind of hash is being used.
|
||||
|
||||
|
||||
**6)** properly format and place it into hashcat as a hashfile
|
||||
|
||||
|
||||
**7)** Successfully find the password corresponding to each of the three hashes to get the password
|
||||
|
||||
|
||||
**8)** Use the password to decrypt the text file and get the flag.
|
||||
|
||||
|
||||
**NOTE** Do you want the source code?
|
||||
|
||||
Upon completing the game, the same password used to get the flag can be used to decrypt the source_code_encrypted.zip.gpg file.
|
||||
|
||||
To build the project, cd into the source_code_encrypted/ directory and run the command:
|
||||
|
||||
#### **make**
|
||||
- will make the project
|
||||
|
||||
#### **make run**
|
||||
- will run the executable
|
||||
|
||||
#### **make clean**
|
||||
- will remove the executable
|
||||
|
||||
If you can't complete the CTF and still want the code, send me an [email](https://left4code.neocities.org/left4code_gpg.txt) and I'll send you the zip file with the code in it. Pretty please send me your gpg key first though so I can encrypt before sending.
|
Binary file not shown.
Reference in New Issue
Block a user