$ nmap -sV target$ sqlmap -u "http://?id=1" --batch$ python3 exploit.py$ gobuster dir -u http://target -w wordlist.txt$ ffuf -u https://t/FUZZ -w words.txt$ hashcat -m 1000 hashes.txt dict.txt$ dig target.com ANY +short$ curl -s https://api/ping
[ MAXIM.CTF ]
ctf://homectf://categoriesctf://events[ ← Home ]
← Back to categories

Crypto

1 challenge • 100 points

100 pts • KICTF 2026

Welcome

## Challenge Overview We were given an encrypted string: `WFZQR1N7VDRHM0o0TF9HMF9HVTNfWDFBVFEwWn0=` ### Step 1 – Base64 Decode ``` XVPGS{T4G3J4L_G0_GU

[ VIEW → ]