Challenge: The Base(64)ics
Threat actors commonly use legitimate tools in nefarious ways. As a CTF player, you’ll need to find creative ways to uncover these types of tactics. While evaluating a recent alert in your EDR, you’ve come across a weird string at the end of a powershell command. Can you help figure out what it’s trying to say?
Course Description
In this weekly challenge, you lean over to your colleague Alice, and she recommends taking a look at a tool called
CyberChef
. It is an open-sourced web application developed by GCHQ for analyzing and decoding data. Spin it up, and let’s learn some basics around Base64.
Module 1: Identify
User Reviews
Be the first to review “Challenge: The Base(64)ics”
You must be logged in to post a review.
×
There are no reviews yet.