cybersecurity basics

Question 3: MJQXGZJTGIQGS4ZAON2XAZLSEBRW63LNN5XCA2LOEBBVIRRHOM======

It is base 32 and base 64 that have == in last and it is base 32 that uses all the capital letters therefore it is base

Task 2: spectrograms

A visual representation of the spectrum of frequencies of a signal as it varies with time. When applied to an audio signal, spectrograms are sometimes called sonographs, voiceprints, or voicegrams. When the data is represented in a 3D plot they may be called waterfalls.

This is what will be displayed after following above steps.

Task 3: Steganography

Steganography is “The process of hiding a message or file within another message or file”. In this we got an image file:

putting this image on steganography decoder gives us:

Task 4: Security through obscurity

Security through obscurity is the reliance in security engineering on the secrecy of the design or implementation as the main method of providing security for a system or component of a system. In this we are given a file, downloading and open it leads us to the flags simply.

The file name and the message are the flags.

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Radhika Agarwal

Radhika Agarwal

2 Followers

Today, the enemy is everywhere and is complacency so I want to broaden my perspective at very young age so that I do not fear the results of 100 battles