Rating: 5.0

Included was a file with 3000 hashes in it. From the length of each, it was quite likely that it was SHA256, possibly with some salt, as each line had a ` <3` appended to it.

Running it through a few wordlists as SHA256 produced no results, but when trying to brute-force we quickly discovered passwords like `F#{1}` and then `F#{49}` etc. Trying to crack all hashes with the flag format and a number in the middle, provided the solution to 2999 of the hashes. It was then clear that the last password also needed to have the flag format, so we wrote a quick hashcat rule `^{^#^F$}` to use with wordlist attacks on the hash.

After a surprisingly short amount of time, `93fa55807cd01fc25067934fd57a0320a6feba09047c5176f3e5e6ea566a1da9:F#{myheartisforadriano}` popped out.