cybersecurity basics

Question 3: MJQXGZJTGIQGS4ZAON2XAZLSEBRW63LNN5XCA2LOEBBVIRRHOM======

Task 2: spectrograms

This is what will be displayed after following above steps.

Task 3: Steganography

putting this image on steganography decoder gives us:

Task 4: Security through obscurity

The file name and the message are the flags.

--

--

--

Today, the enemy is everywhere and is complacency so I want to broaden my perspective at very young age so that I do not fear the results of 100 battles

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

BORE Coin May Newsletter:

{UPDATE} Woid Word Hack Free Resources Generator

Security secured through secAI

#0 Findora Academy💟: Setting up MetaMask🦊 for FRC-20 FRA Tokens

Day 3 of 31-Day May LeetCode Challenge

Most frequently seen hacker tools

Designing a Virtual Network.

Playing With iframes: Bypassing Content-Security-Policy

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Radhika Agarwal

Radhika Agarwal

Today, the enemy is everywhere and is complacency so I want to broaden my perspective at very young age so that I do not fear the results of 100 battles

More from Medium

How to Goal Set Like a Pro — Part 1

Advent of Cyber 2021 — [Day 1] Save The Gifts

How to be a Hacker?

OWASP Top 10 Updated 2021 List