TheZeal0t's Fingerprints Are All Over This!

Challenge:

A "hash" is a "digital fingerprint" of a file that is astronomically improbable to duplicate with other content by accident, and nearly impossible to duplicate intentionally. Therefore, it is often used as a "shorthand" to identify a file.

Calculate the SHA256 sum of TheZeal0t's cryptoware program, and its decryptor program. Enter the two hashes as the flag, separated by a pipe symbol, with the cryptoware's hash first, followed by the decryptor program's hash. Example:

flag{435524cc4113668d3f1e1e761d1717ba1bcf8b86b6dfaab9d048338e4e00a764|5d213aa47efd7e255c8304f56f148f87488a4bd9488f631ac4ed87f02c85cdce}

TheZealot's Encryptor TheZealot's Decryptor

Solution:

This challenge was pretty straightforward, download the files, calculate the SHA256 hashes and submit the flag:

$ shasum -a256 zealotcrypt-02*
969102c7feb6003624c4caf0e00fa9a60d96bc503ef0beb71ed4af68ba1fc047  zealotcrypt-02-decrypt.bin
5a54fb61f7b1a9b1b7405602388add7e3323890bc74952a62803ffb1a535338b  zealotcrypt-02.bin

The accepted flag was, flag{5a54fb61f7b1a9b1b7405602388add7e3323890bc74952a62803ffb1a535338b|969102c7feb6003624c4caf0e00fa9a60d96bc503ef0beb71ed4af68ba1fc047}.

Published:

Updated:

Leave a comment