cybersecurity basics

Question 3: MJQXGZJTGIQGS4ZAON2XAZLSEBRW63LNN5XCA2LOEBBVIRRHOM======

Task 2: spectrograms

This is what will be displayed after following above steps.

Task 3: Steganography

putting this image on steganography decoder gives us:

Task 4: Security through obscurity

The file name and the message are the flags.

--

--

--

Today, the enemy is everywhere and is complacency so I want to broaden my perspective at very young age so that I do not fear the results of 100 battles

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

MoonRat: Protect The BNB Reward pool!

FileMaker, WordPress, and the Healthcare Medical Industry — HIPAA Compliance

FileMaker, WordPress, and the Healthcare Medical Industry - HIPAA Compliance 1

Anonymous and Authenticated: Digital Identity on the Open Internet

Disk Encryption — Azure Virtual Machines

DSAR probing ‘attack’ from Princeton researchers

Not So Secret Handshake, Demystifying the HNS Ecosystem

How to handle a B2B data breach

Staking LP Tokens on QOM.cards

QOM Legendary NFT Cards

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Radhika Agarwal

Radhika Agarwal

Today, the enemy is everywhere and is complacency so I want to broaden my perspective at very young age so that I do not fear the results of 100 battles

More from Medium

My Journey in Cybersecurity

From Mall Cop to Cybersecurity

Here is how you can become an ethical hacker

My Journey from NEET Aspirant to an Ethical Hacker