Skip to content

A Spooky set of CTF like challenges. (made for lawrence Jayhakers meeting on 10/31/2019)

Notifications You must be signed in to change notification settings

KUISC/SpookyChallenges

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 

Repository files navigation

Welcome to Spooky Land

Challenges

  1. Hashing is used to verify if files are the same as other files. One major use of this is to verify if a file that has been downloaded from the internet had either been intentionally modified to include malicious content or to check if it was corrupted in transit. Your task is to verify which of the copies of Frankensteins are unaltered and which have been modified.

    • Hints

      • Frankenstein.txt is the orginal
      • Their are several options of hashes you can use to check the files. Why might some be better than others?git
  2. Your challenge if you choice to accept it is to recover the file hidden in WhatAtMystery.

    • Hints

      • You might want to look at different base encoding schemes
      • The command "file <filename>" is your best friend

Contributors

  1. Thomas atkins www.github.com/Nova38

Sources

  1. Thank you to Project Gutenberg their online copy of Frankenstein
    • This eBook is for the use of anyone anywhere at no cost and with almost no restrictions whatsoever. You may copy it, give it away or re-use it under the terms of the Project Gutenberg License included with this eBook or online at www.gutenberg.org
    • URL to frankenstein gutenberg.org/cache/epub/42324/pg42324.txt
  2. Photo from by Bekir Dönmez on Unsplash

About

A Spooky set of CTF like challenges. (made for lawrence Jayhakers meeting on 10/31/2019)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published