cybersecurity basics


It is base 32 and base 64 that have == in last and it is base 32 that uses all the capital letters therefore it is base

Task 2: spectrograms

A visual representation of the spectrum of frequencies of a signal as it varies with time. When applied to an audio signal, spectrograms are sometimes called sonographs, voiceprints, or voicegrams. When the data is represented in a 3D plot they may be called waterfalls.

This is what will be displayed after following above steps.

Task 3: Steganography

Steganography is “The process of hiding a message or file within another message or file”. In this we got an image file:

putting this image on steganography decoder gives us:

Task 4: Security through obscurity

Security through obscurity is the reliance in security engineering on the secrecy of the design or implementation as the main method of providing security for a system or component of a system. In this we are given a file, downloading and open it leads us to the flags simply.

The file name and the message are the flags.



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Radhika Agarwal

Radhika Agarwal


Today, the enemy is everywhere and is complacency so I want to broaden my perspective at very young age so that I do not fear the results of 100 battles