Tags: cracking password 

Rating:

#### Original Writeup - [https://github.com/CTSecUK/CyberYoddha-CTF-2020/blob/main/Write-ups/Me%2C%20Myself%2C%20and%20I.md](https://github.com/CTSecUK/CyberYoddha-CTF-2020/blob/main/Write-ups/Me%2C%20Myself%2C%20and%20I.md)

-----

# Me, Myself, and I

![Category](http://img.shields.io/badge/Category-Password%20Cracking-orange?style=for-the-badge) ![Points](http://img.shields.io/badge/Points-225-brightgreen?style=for-the-badge)

This time we're given a longer hash;

`2412f72f0f0213c98c1f9f6065728da4529000e5c3a2e16c4e1379bd3e13ccf543201eec4eb7b400eb5a6c9b774bf0c0eeda44869e08f3a54a0b13109a7644aa`

Again i run this through hash-identifier;

![hash-dentifier](https://github.com/CTSecUK/CyberYoddha-CTF-2020/raw/main/images/me_myself_and_i_hash-identifier.png)

Well before we try cracking a SHA-512 let's look at the whirlpool option;

I head over to the site [https://md5hashing.net](https://md5hashing.net/hash/whirlpool/2412f72f0f0213c98c1f9f6065728da4529000e5c3a2e16c4e1379bd3e13ccf543201eec4eb7b400eb5a6c9b774bf0c0eeda44869e08f3a54a0b13109a7644aa) and try decrypting the hash as a **whirlpool** hash.

And the hash is decrpyted;

![screenshot](https://github.com/CTSecUK/CyberYoddha-CTF-2020/raw/main/images/me_myself_and_i_whirlpool%20decrypt.png)

## cyctf{whoami}

Original writeup (https://github.com/CTSecUK/).