Skip to main content

Hash - SHA-2

  • Description: This hash was stolen during a session interception on a critical application, errors may have occurred during transmission. No crack attempt has resulted so far; hash format seems unknown. Find the corresponding plaintext. The answer is the SHA-1 of this password.
  • Difficulty: Very easy

🔎 Solution

The challenge provides a suspicious-looking string, and according to the statement, it may have been corrupted during transmission.

96719db60d8e3f498c98d94155e1296aac105ck4923290c89eeeb3ba26d3eef92

Upon inspection, the string contains the character "k", which is weird, as "k" is not a valid hexadecimal character (hexadecimal only includes 0-9 and a-f). This suggests the string is not a valid hexadecimal hash in its current form.

By simply removing the invalid "k" character, the string becomes:

96719db60d8e3f498c98d94155e1296aac105c4923290c89eeeb3ba26d3eef92

This is a valid SHA-256 hash. Using this tool, I was able to decrypt it and retrieve the original plaintext as 4dM1n.

Hashing this string using SHA-1 produces the final result:

a7c9d5a37201c08c5b7b156173bea5ec2063edf9

This is the flag.

🚩Flag

a7c9d5a37201c08c5b7b156173bea5ec2063edf9