write up ctf by ariafatah
A company stored a secret message on a server which got breached due to the admin using weakly hashed passwords.
Can you gain access to the secret stored within the server? Access the server using
nc verbal-sleep.picoctf.net 57356
nc verbal-sleep.picoctf.net 57356
# Welcome!! Looking For the Secret?
# We have identified a hash: 482c811da5d5b4bc6d497ffa98491e38
Enter the password for identified hash: password123 # <-- 1
# Correct! You've cracked the MD5 hash with no secret found!
# Flag is yet to be revealed!! Crack this hash: b7a875fc1ea228b9061041b7cec4bd3c52ab3ce3
Enter the password for the identified hash: letmein # <-- 2
# Correct! You've cracked the SHA-1 hash with no secret found!
# Almost there!! Crack this hash: 916e8c4f79b25028c9e467f1eb8eee6d6bbdff965f9928310ad30a8d88697745
Enter the password for the identified hash: qwerty098 # <-- 3
# Correct! You've cracked the SHA-256 hash with a secret found.
The flag is: picoCTF{UseStr0nG_h@shEs_&PaSswDs!_dcd6135e}
echo -e "password123\nletmein\nqwerty098" | nc verbal-sleep.picoctf.net 57356
picoCTF{UseStr0nG_h@shEs_&PaSswDs!_dcd6135e}