Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

**For Cybersecurity class using Kali VM!** but I guess you could just use a regular linux terminal with openSSL** Part I (40 points): An attacker

**For Cybersecurity class using Kali VM!** but I guess you could just use a regular linux terminal with openSSL**

Part I (40 points):

An attacker left a CD in the trash at your company that contained a single file called plans. Click on the link below to download the file:

plans2

(Edit from Me: the following is what is in the plans2 file because you obviously cant click it:)

U2FsdGVkX1/Xn35JajAHX9dmQJKAOU5GDlg94Fv9oF+17tAXFsnr8Zs9vjRkR4pB XO3sUV1OwKIPdSA27eE2Pg==

Either download the plans file from Kali or move to file to your Kali VM.

On the outside of the CD the word wheaton was written. That word may be important in this exercise. You looked at the content of the file and it looks to be base64 encoded.

Decrypt & decode the file.

(Hint: You will need to use the openssl command in the Kali terminal to decrypt this file and will need to determine the correct cipher that was used. This will take some trial and error. You will need to figure out the correct arguments to the openssl command to:

- Specify the correct cipher (this will be trial and error) You can see the Cipher commands at the bottom if you just enter openssl help

- Decrypt the file

- Base64 decode the file

- Choose the plans file as input to the command

Answer this question by:

1. Providing a screenshot in your report of the decrypted plaintext message

2. Providing a screenshot of the full command and options that allowed you to decrypt the message in your report.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions