🌟
Noel's Cyberkshetra Blogspace
LinkedIn ProfileGithub ProfilePersonal Blogspot
  • Welcome to my Gitbooks Page
  • 💽Let's Defend Blue Team Walkthroughs
    • SOC164 - Suspicious Mshta Behavior Alert
    • SOC147 - SSH Scan Activity Alert
    • SOC146  -  Phishing Mail Detected Alert
    • SOC145 - Ransomware Detected Alert
    • SOC144  -  New scheduled task created Alert
    • SOC143 - Password Stealer Detected Alert
    • SOC141  -  Phishing URL Detected Alert
    • SOC141 - Phishing URL Detected Alert
    • SOC137 — Malicious File/Script Download Attempt: A Walkthrough
    • SOC109  -  Emotet Malware Detected Alert
    • SOC104 - Malware Detected Alert
    • SOC101  -  Phishing Mail Detected Alert
    • HTTP Basic Auth: Let's Defend DFIR Challenge
    • ShellShock Attack: Let’s Defend Challenge
    • 2021’s 0-Day MSHTML: Let's Defend Lab
  • 🤺BTLO Walkthroughs
    • BTLO: Network Analysis-Web Shell Challenge
    • BTLO: Suspicious USB Stick Challenge
  • 💒WiCYS CyberStart
    • Chapter 1 - Amsterdam A Running Start
      • WiCYS CyberStart (Amsterdam) Challenge 1
      • WiCYS CyberStart (Amsterdam) Challenge 2
      • WiCYS CyberStart (Amsterdam) Challenge 3
      • WiCYS CyberStart (Amsterdam) Challenge 4
    • Chapter 2 - Tokyo Patterns of Behaviour
      • WiCYS CyberStart (Tokyo) Challenge 1
      • WiCYS CyberStart (Tokyo) Challenge 2
      • WiCYS CyberStart (Tokyo) Challenge 3
      • WiCYS CyberStart (Tokyo) Challenge 4
    • Chapter 3 - Barcelona In the thick of it
      • WiCYS CyberStart (Barcelona) Challenge 1
      • WiCYS CyberStart (Barcelona) Challenge 2
      • WiCYS Cyberstart (Barcelona) Challenge 3
      • WiCYS CyberStart (Barcelona) Challenge 4
  • 📕Technical Cyber articles
    • An in-depth analysis of an Intrusion Prevention System
    • DevSecOps-Making a difference from traditional DevOps
    • CVE - 2020–1472 (Zerologon Vulnerability)-Exploitation & Remediation
    • Computer Forensics Acquisition
    • Cyber Hygiene Tips
    • Hack your System - Linux Edition
    • Markovian Parallax Denigrate-Breaking the cipher
    • SIEM-Incorporating Incident Response into Network Security
    • Social Engineering-A leading cause for vulnerability occurrence
    • Report Writing in Digital & Multimedia Forensics
    • Zero-Day Vulnerabilities: A short overview
    • Zero Trust Network Access-A solution to Network Security
  • 🧑‍💻Hack The Box : Starting Point Machines
    • Meow
    • Fawn
    • Dancing
    • Redeemer
Powered by GitBook
On this page
  • Briefing L03 C01
  • Hextraordinary
  • Hex or XOR?
  • Scoreboard
  1. WiCYS CyberStart
  2. Chapter 3 - Barcelona In the thick of it

WiCYS CyberStart (Barcelona) Challenge 1

XOR Decoding

PreviousChapter 3 - Barcelona In the thick of itNextWiCYS CyberStart (Barcelona) Challenge 2

Last updated 3 years ago

Hello, fellow Cyberstart gamers!

Having touched base 3 on our CyberStart journey, in Barcelona, it’s time again to solve some security challenges. We are handed an overview of the challenges on the horizon.

Briefing L03 C01

Hextraordinary

Intern, the agency have been in contact with a rival hacker to a new, secretive gang of hackers who goes by the name “ROXy”. She specializes in short, cryptic, hard to decipher secret codes.

ROXy is willing to work with us… if we can prove we’re as smart as she is. Before she’ll hand over any information, she’s given us a code to break first.

If you can help us break this code, we’ll gain an important new informant.

Tip: The flag is the secret code.

We are provided with the codes, from ROXy in this email

Codes — 0xB105F00D and 0xAAA8400A

Hex or XOR?

Proceed to insert them in the given blanks — input A and B and click on Calculate XOR

The resultant value is = 1badb007

Since it was asked to get the code in 0x form, let’s append it to the start of the code and submit it

Turns out it was the correct answer.

Scoreboard

Onward ahoy to the next challenge!

By looking at the syntax of codes, it is evident that they are of XOR type. Let’s see if they equate to something on an

💒
online XOR calculator