@escugs said:
oooo i am so stupid i figure it out.
could you please explain?
@GRIMREAPER There is song two the left one to the right
I hope this will help you with out putting spoilers.
upper case or lower case matters for fill the flag on the box?
@mokrea I assume it matters because the correct string has both upper and lower case chars.
@grimreaper think about what the USB device is and what those “2 strange codes” @escugs mentioned map to
copy pasting was the reason it wasn’t accepting in my case. entered it manually and it worked fine…
Someone mind PM’ing me, I’ve got it sorted but the flag doesn’t seem to want to take.
pm me
It is really worth mentioning that copy and paste is an issue for the solution. I spent the last 3 hours attempting to copy/paste the correct answer in only to have it rejected. I read the post from Cryo (above) tried typing it directly in and it worked a treat. Great Challenege though!!
i’m stuck, can someone help me pls. i got the 2 strange codes. tks
_one!>>>>>>>>>>>Loved_this : )
I’m stuck with this can anyone point-me the right direction? I got the mail address the supposed flag (doesn’t work) and a bunch of other strings than doesn’t make sense to me. This is my firsts challenge but I’m stuck. I can share in pv all the flags that I have. Thanks
Hello, I’m quite sure that I’ve found correct flag HTB{sentence that makes sense, with different letters}.
$ echo “HTB{flag}” | md5
83d503dab85f76722949bbc48282aec4
Could someone confirm or deny?
deny
Can someone help me, i have the got 3 string, one email address and other stating as password and third could be the flag, but not taking tried to reshuffle it but still not working. Can any one please ping me for the help please
i think the challenge is to rearrange the output. you need to “carefully” rearrange all the output back to normal. i’ve encountered several times where my final arrangement is not correct
Solved it.
Hints.
So, i’m new to Forensics, the file was a .pcap which can be opened using wireshark. which i did open. after that i din’t get whats next. its just like some usb trafic happened which is most are usb interrupt in, which i think we need to ignore. can anyone help me understand stuff
@Avinash said:
So, i’m new to Forensics, the file was a .pcap which can be opened using wireshark. which i did open. after that i din’t get whats next. its just like some usb trafic happened which is most are usb interrupt in, which i think we need to ignore. can anyone help me understand stuff
When you’ve hit a wall, question your assumptions.
Can someone PM on the scrambled (output) line of text? Like what method to use? I have theory but it does not seems to add up.
Update: Got it. Literally follow the arrows…No need to overthink.
@Avinash said:
So, i’m new to Forensics, the file was a .pcap which can be opened using wireshark. which i did open. after that i din’t get whats next. its just like some usb trafic happened which is most are usb interrupt in, which i think we need to ignore. can anyone help me understand stuff
Do some research on this stuff if you don’t understand it. John Hammond on YouTube has a pretty good video explaining it.