Target I: Cryptography and Steganography
Recently I completed Tier 1 of Target’s Cyber Defense Challenge offered to members of the WiCys (Women in Cybersecurity) organization. It was a CTF comprised of four categories: cryptography/steganography, reverse engineering, USB forensics, and cyber threat intelligence. In this first part, I will go over the challenges in the cryptography / steganography section. Beware the Ides of March 100 points You have intercepted the following message from the threat actor! Decrypt the message to reveal the secret phrase:...