Tags: forensics
Rating:
# Encrypted Storage 2
Category: Forensics
Points: 367
Solved by: staccah_staccah
## Problem
Sometimes stupid hackers leave behind signatures that can be used to find them - the one that wrote ransomware is no exception.
## Writeup
By concatenating in the right order the bytes we previously removed from the files to rebuild them in the challenge Encrypted Storage 1 and converting them to ascii we have our flag: `kks{1_w4s_h3r3!}`