Question
**For Cybersecurity class using Kali VM!** but I guess you could just use a regular linux terminal with openSSL** Part I (40 points): An attacker
**For Cybersecurity class using Kali VM!** but I guess you could just use a regular linux terminal with openSSL**
Part I (40 points):
An attacker left a CD in the trash at your company that contained a single file called plans. Click on the link below to download the file:
plans2
(Edit from Me: the following is what is in the plans2 file because you obviously cant click it:)
U2FsdGVkX1/Xn35JajAHX9dmQJKAOU5GDlg94Fv9oF+17tAXFsnr8Zs9vjRkR4pB XO3sUV1OwKIPdSA27eE2Pg==
Either download the plans file from Kali or move to file to your Kali VM.
On the outside of the CD the word wheaton was written. That word may be important in this exercise. You looked at the content of the file and it looks to be base64 encoded.
Decrypt & decode the file.
(Hint: You will need to use the openssl command in the Kali terminal to decrypt this file and will need to determine the correct cipher that was used. This will take some trial and error. You will need to figure out the correct arguments to the openssl command to:
- Specify the correct cipher (this will be trial and error) You can see the Cipher commands at the bottom if you just enter openssl help
- Decrypt the file
- Base64 decode the file
- Choose the plans file as input to the command
Answer this question by:
1. Providing a screenshot in your report of the decrypted plaintext message
2. Providing a screenshot of the full command and options that allowed you to decrypt the message in your report.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started