Rating: 5.0
(sorry abt this writeup, this is my first one :) )
So we're provided a file called **WhiteNoise** with a hint: "uUt_CtF_2020" - this will be useful later.
We can't open the file, so let's check what type of file it is with **'file WhiteNoise'** in a terminal
It returns that it's just a data file.
Let's open it in a hex editor to check out the file headers.
Straight away, we can see that the file header is **AES** and was encrypted with **AESCRYPT**
A quick google search tells us that AESCRYPT is a file encryption software...so let's install it.
Before we run it through the program, we need to rename it to a .aes file with **mv WhiteNoise WhiteNoise.aes**
Open it with the AEScrypt software and it asks for a password. Enter the string provided in the hint and the file unzips another one.
Let's check the file type of this file: **file WhiteNoise** and it returns that it is a M4A file type. Rename it to one through mv **mv WhiteNoise WhiteNoise.M4A**
Now we can open it. It sounds like the audio is backwards speech - let's open it in an audio editor to reverse it. I used Adobe Audition, but you can also use Audacity or any other audio editor.
The person says '**Congratulations, you found the UUTCTF Flag, The flag is {we are anonymous}**
Solved.