Recently I played ShadowCTF. Let’s see how I was able to solve few challenges.

Cryptography

All the cryptography challenges were awesome. ( Google search and Decodefr are my helping hands in Cryptography challenges.)

Valhalla

So let’s see what is inside “File”

“Security is not merely a product, but a process” very well said by American Cryptographer Bruce Schneier.

Whether you are a small organization or a big organization Security is the biggest challenge nowadays. Governments are putting more weightage on data security by applying strict compliance/rules and due to an increase…

What are Extensions

Tiny software programs that configure the browsing experience are extensions.

  • They allow users to adjust the features and behavior of Chrome to individual needs or preferences.
  • They are built on web technologies such as HTML, JavaScript, and CSS.

Let’s build our first chrome Extension.

Step 1: Create a “manifest.json” file.

Cloud computing is where the resources on the network are not actually physical in nature.

  • They are provided to the user virtually.
  • This can lead to a very fluid and dynamic environment as required resources are normally only provisioned as needed and are decommissioned once their use is done.

Most often, these virtual resources are not owned by the company that uses them but are…

Recently I participated in MetaCTF 2020. I was running out of time because I have started solving challenges 2-hour before CTF ends. So due to that, I was able to solve a few challenges. Let’s see how I solved it

Cryptography

1.Crypto Stands For Cryptography

Given string:

TWV0YUNURntiYXNlNjRfZW5jMGRpbmdfaXNfbjB0X3RoZV9zYW1lX2FzX2VuY3J5cHRpMG4hfQ==

Raj Upadhyay

Pursuing M. Tech. in Cyber Security and Incident Response. #LoveToPlayCTF #infosec #cybersecurity

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store