Huntress CTF 2024: Base64by32

Challenge Name: Base64by32

Category: Scripting

Author: @JohnHammond

Challenge Description:

This is a dumb challenge. I'm sorry.

Artifact Files:

Approach

After unzipping the archive, we can see that there's a large amount of base64 encoded data in the base64by32 file. We can write a script to decode it. Looking at the name of the challenge, we can infer that the flag is encoded 32 times, so we can write a loop to decode it 32 times and grab the flag.


import base64
with open("base64by32", "rb") as file:
    data = file.read()
for i in range(32):
    data = base64.b64decode(data)
print(data)
        

Flag:flag{8b3980f3d33f2ad2f531f5365d0e3970}

Reflections

This was a fun warmup challenge, short and sweet :)