Instructions
There is some internal back-and-forth at ESU regarding which file was exfiltrated by DEADFACE. They’ve asked us to determine “the hash of the file”. When asked what kind of hash, they responded “It doesn’t matter - anything so that we can verify the integrity of the data stolen”. See if you can find a hash for the file stolen by DEADFACE within the packet capture.
Submit the flag as flag{hash}
.
Use the packet capture from Scans.
Solution
The attack exfiltrated the backup and provided us with a sha1sum of the exfiltrated backup.
flag{334a3d4f976cdf39d49b860afda77d6ac0f8a3c6}