O'Reilly logo

Kali Linux CTF Blueprints by Cameron Buchanan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Scenario 1 – encode-ageddon

Simply put, encoding is a process where if an individual is aware of the process used, it is possible for them to reverse the encoding. An example would be if I gave you a message and said it was Base64-encoded; you would be able to simply turn it back into clear-text. Encryption, on the other hand, is where if I told you that it was AES-CBC-SHA-1(256) encrypted, you wouldn't be able to reverse it without a great deal of other information (dependent on the method). Even methods such as RC4, which are broken, are non-reversible without knowledge of the key or clear-text. We will cover these methods later.

Generic encoding types

We're going to use encoding as a layer of obfuscation rather than a secure method, as the aim ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required