Step 1: Click on the green button to Start the Lab
Step 2: Hack the URL or IP of the lab
Step 3: Use your skills and logic to find the flags!
transaction_data.json
file from the challenge pagevout
array in the transaction"type": "nulldata"
scriptPubKey
asm
field shows: OP_RETURN 6a4c4a666c61673a31653533303236302d636631302d343566362d613438312d346664336264363732616437
hex
field contains: 6a4c4a666c61673a31653533303236302d636631302d343566362d613438312d346664336264363732616437
OP_RETURN
is: 6a4c4a666c61673a31653533303236302d636631302d343566362d613438312d346664336264363732616437
echo '6a4c4a666c61673a31653533303236302d636631302d343566362d613438312d346664336264363732616437' | xxd -r -p
python3 -c "import binascii; print(binascii.unhexlify('6a4c4a666c61673a31653533303236302d636631302d343566362d613438312d346664336264363732616437').decode())"
jLJflag:1e530260-cf10-45f6-a481-4fd3bd672ad7
jLJflag:
followed by the actual flag1e530260-cf10-45f6-a481-4fd3bd672ad7
1e530260-cf10-45f6-a481-4fd3bd672ad7
echo '6a4c4a666c61673a31653533303236302d636631302d343566362d613438312d346664336264363732616437' | xxd -r -p | sed 's/jLJflag://'
1e530260-cf10-45f6-a481-4fd3bd672ad7
Sign-in to your account to access your hacking courses and cyber security labs.
Access all hacking courses and cyber security labs.