Description
We managed to wiretap our target when it connected to its remote server. Will you manage to find its password?
The flag is FCSC{H}
where H
is the hash of the password using SHA256.
Note: There is no need to try all the possible hashes on this website.
Files
-
the-pake-is-a-lie.py
3.43 KiB – cc00d0ac8cc9e130f2fa60facc10cd6af309dbfc2ee7aec692017ba1c68d16b0 -
output.txt
2.05 KiB – 24a2849a82ab174f0d029726266558f9a71b718aca37f692d3d68b47fc20a724
Author

Maxime
Flag
Submit your solution
You can submit your writeup for this challenge. Read the FAQ to learn how to proceed.
You need to be logged in to submit a writeup.