tag:blogger.com,1999:blog-33242194251147061.post3257324210965250754..comments2024-03-26T23:48:32.538-05:00Comments on RaiderSec: SANS Holiday Challenge 2012 Zone 1 WriteupJordanhttp://www.blogger.com/profile/09317580042468804874noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-33242194251147061.post-13922516514947002012013-01-07T12:57:56.772-06:002013-01-07T12:57:56.772-06:00Thanks for the great comment! This is absolutely t...Thanks for the great comment! This is absolutely true, and a great catch.<br /><br />My goal was to use this scenario as an example of how to approach the problem in a more generic sense. A hex editor is a fantastic tool to have on hand during CTFs, or other engagements in general, so I figured this would be a good example to demonstrate the basics of using one.<br /><br />Thanks again for the comment. It's always good to hear other ways of solving the challenges.Jordanhttps://www.blogger.com/profile/09317580042468804874noreply@blogger.comtag:blogger.com,1999:blog-33242194251147061.post-84340533318035574502013-01-07T12:39:57.009-06:002013-01-07T12:39:57.009-06:00You don't even need a hex editor to get the pa...You don't even need a hex editor to get the password out. Just look at the jpg file's properties from your OS. IceIceBaby! is in the comments field of the metadata.Anonymousnoreply@blogger.com