Description
This challenge has been split into three independent steps, but the logical order is as follows: forensics (1) -> pwn (2) -> reverse (3).
*/!\ Warning: the program can actually cause some harm to your system /!*
Phew! You have managed to recover the malware, connect to the attacker’s server and recover the private key (file key.priv
attached) used to encrypt your precious flag.
The key.priv
file was originally named: 0fdb0eea57198b3bb69e8267690ede5d5ba95ab791638a610372120b773d4acc_2021-03-15|21:34:41.priv
.
Decrypt the flag.txt
file to get the flag.
Flag
Submit your solution
You can submit your writeup for this challenge. Read the FAQ to learn how to proceed.
You need to be logged in to submit a writeup.