DSC USTP Hackathon Challenge

James Gaid
3 min readDec 21, 2020

In this challenge, they’ll give you a link for a google drive with an image so once I downloaded it I check the image.

It says here that it’s a PNG file and since PNG images are prone in stega I use quick strings.

And here I finally see there is a RAR file embedded to the PNG file with a hint of the RAR password “dscustp”, so I tried to unzip it with the password given.

So here is the message.

On every link, there is a hint. So let’s check the first one. https://cutt.ly/meisacronym in this link it has a hint of “me is acronym”

The link will redirect you to this page “Journal for Vascular Ultrasound”, so since the hint is that it is an acronym so I wrote down “JVU”.

Second link https://cutt.ly/firstnameoftheuser and the hint is “first name of the user”

The link will redirect you to this page and just click more information and there is your user’s first name.

Third link https://cutt.ly/iamsymbol45 hint is “I am symbol 45”, the link will redirect you to a table of elements you’ll just need to find the symbol of the atomic number 45.

Fourth link https://cutt.ly/iamnotwordnorletter hint “I am not word nor letter”, this one is easy you will be redirected to this page and you know what it is.

And the last link https://cutt.ly/iamwhatyoucanseeinfirstglance hint “I am what you can see in first glance” this will redirect you to a radio station web page, so since the last thing to do in this challenge is to decrypt it from a caesar cipher we know that it is KLCZ.

So to sum up what we’ve got.

Cipher text: jvunyhaz rh-klcz!

Decoded text: congrats ka-devs!

--

--