SHAshank Redemption

100

Instructions

There is some internal back-and-forth at ESU regarding which file was exfiltrated by DEADFACE. They’ve asked us to determine “the hash of the file”. When asked what kind of hash, they responded “It doesn’t matter - anything so that we can verify the integrity of the data stolen”. See if you can find a hash for the file stolen by DEADFACE within the packet capture.

Submit the flag as flag{hash}.

Use the packet capture from Scans.

Solution

The attack exfiltrated the backup and provided us with a sha1sum of the exfiltrated backup.

flag{334a3d4f976cdf39d49b860afda77d6ac0f8a3c6}

Continued On

New Addition