BackdoorCTF 2016 - intro16 - Akash Trehan

BackdoorCTF 2016 - intro16

Backdoor Logo

BackdoorCTF is the annual flagship CTF competition conducted by SDSLabs and InfoSecIITR.

Points: 10


Get the first part of the flag from IRC freenode (#backdoorctf) and the second part from twitter(@BackdoorCTF)


As the description says I got the first part of the flag from IRC(#backdoorctf) -> NWQ1bDRiNV9iNG

The second part of the flag from twitter(@BackdoorCTF) -> NrZDAwcmM3ZjIwMTY=

Joining this we get a base64 encoded string -> NWQ1bDRiNV9iNGNrZDAwcmM3ZjIwMTY=

Decoding this and taking its SHA256 hash we get our solution.

echo -n NWQ1bDRiNV9iNGNrZDAwcmM3ZjIwMTY= | base64 --decode | shasum -a 256

Note that I added -n for echo to prevent an extra newline being appended at the end, which will change the SHA256 checksum.

Follow @CodeMaxx
Bandit Level 19
Akash Trehan

Akash Trehan


comments powered by Disqus
rss facebook twitter github youtube mail spotify instagram linkedin google pinterest medium