Start the machine, hack the system, and find the hidden flags to complete this challenge and earn points!
This walkthrough explains how to hack the lab and capture the flags. For help with Learning Mode questions, use the Request Hint button next to each question.
transaction_data.json file from the challenge pagevout array in the transaction"type": "nulldata"scriptPubKeyasm field shows: OP_RETURN 6a4c4a666c61673a31653533303236302d636631302d343566362d613438312d346664336264363732616437hex field contains: 6a4c4a666c61673a31653533303236302d636631302d343566362d613438312d346664336264363732616437OP_RETURN is: 6a4c4a666c61673a31653533303236302d636631302d343566362d613438312d346664336264363732616437echo '6a4c4a666c61673a31653533303236302d636631302d343566362d613438312d346664336264363732616437' | xxd -r -ppython3 -c "import binascii; print(binascii.unhexlify('6a4c4a666c61673a31653533303236302d636631302d343566362d613438312d346664336264363732616437').decode())"jLJflag:1e530260-cf10-45f6-a481-4fd3bd672ad7jLJflag: followed by the actual flag1e530260-cf10-45f6-a481-4fd3bd672ad71e530260-cf10-45f6-a481-4fd3bd672ad7echo '6a4c4a666c61673a31653533303236302d636631302d343566362d613438312d346664336264363732616437' | xxd -r -p | sed 's/jLJflag://'1e530260-cf10-45f6-a481-4fd3bd672ad7Choose how you want to get started
Choose a username to get started
We've sent a 9-character code to your email