Hack the CTF
  • 🚩Welcome to Hack the CTF
  • Getting Started
    • ⭐Course Overview
    • ❓Why We Made This Course
    • 🔷Why CTFs are Important
    • Types of CTFs
    • Interesting CTF Info
  • Basics
    • Flag Format
    • Challenge Types (chals)
    • ✨Misc Terms & Rules
    • Tools and Methods
    • 🎮Let's Play
  • The Challenges
    • 🤔Learn, Hints, Solutions
    • 🟩EASY CHALS
      • 🟩Flag on a Function
      • 🟩Binary
      • 🟩Find and Watch
      • 🟩Lots of Them
      • 🟩Who Said This?
      • 🟩Click This Link
      • 🟩Remote Connect
      • 🟩Beeps and Beeps
      • 🟩Someone Not Use HTTPS
      • 🟩Cipher
      • 🟩Find Someone
      • 🟩CTF Page #2
      • 🟩Too Much Blue
    • 🟨MEDIUM CHALS
      • 🟨Hiding Right in Front of You
      • 🟨Base64 is the Answer
      • 🟨Hash of the Server IP Address
      • 🟨Query String
      • 🟨Literally in the Picture
      • 🟨Find the Texty Record
      • 🟨Where in the git is the Flag?
      • 🟨Websockets Delivery
      • 🟨Hacker Hid a File
      • 🟨I Hear Something
      • 🟨Where Am I?
      • 🟨Shakespeare is Hiding Something
      • 🟨CTF Page
    • 🟥HARD CHALS
      • 🟥Image Doesn't Work
      • 🟥Where is it?
      • 🟥Code Breaker
      • 🟥TV - Amateur Radio Way
  • Extra Resources
    • Where to Find More CTFs
  • Conclusion
    • Course Recap
    • 📝Quiz
    • 🦉Keep on Learning
  • SouthHills Info Request
Powered by GitBook
On this page
  1. The Challenges
  2. MEDIUM CHALS

Hash of the Server IP Address

PreviousBase64 is the AnswerNextQuery String

Last updated 5 months ago

CRYPTO | code breaking secrets hidden in numbers and symbols | MEDIUM

A one-way hash is a cryptographic function that takes an input (or 'message') and returns a fixed-size string of bytes. The output is unique to each unique input, making it impossible to generate the original input from the hash. This property is crucial for applications like password storage, where the hash provides security by ensuring that passwords cannot be easily reversed.

This challenge simple asks you to figure out two things: 1) what is the IP address of the server for ctf.bizity.biz and 2) what is the hash of that ip address.

There are multiple hash algorithms out there and this one asks for the MD5.

MD5, while historically popular, is considered cryptographically broken and unsuitable for further use. Its weaknesses include susceptibility to hash collisions, where two different inputs produce the same hash output. This vulnerability undermines its integrity, making it insecure for digital signatures and certificates. Additionally, MD5 is vulnerable to extensive brute force and dictionary attacks due to advances in computational power. It's recommended to use more secure hashing algorithms like SHA-256 for cryptographic purposes.

Hints

Be careful not to include new-line characters or any spaces in the ip address since that would give you a completely different hash.

Solutions

🟨
🟨
https://www.youtube.com/watch?v=NposCIHufdI&list=PLFuCtJnW6S5iSDjIFa2QAjWi7BcKJBJhm