Tags: forensics 

Rating:

# Encrypted Storage 2
Category: Forensics

Points: 367

Solved by: staccah_staccah

## Problem

Sometimes stupid hackers leave behind signatures that can be used to find them - the one that wrote ransomware is no exception.

## Writeup

By concatenating in the right order the bytes we previously removed from the files to rebuild them in the challenge Encrypted Storage 1 and converting them to ascii we have our flag: `kks{1_w4s_h3r3!}`

Original writeup (https://github.com/r00tstici/writeups/tree/master/kksCTF_2020/Encrypted%20Storage%202).