Tags: decode crypto warmup 

Rating:

# esab64

The challenges gives a file called `esab64` with an encoded message. The first thing i though was trying to decode the message with base64. The thing is that the result was not... something clear. After a while, an idea came to my mind: esab64 looks like base64 but in reverse so... why not trying to reverse the initial message and then decode it with base64. My idea seems to have worked:

```
_}e61e711106bd0db1b78efa894b1125bf{galf
```

I just had to reverse that message again to get the flag:

```
flag{fb5211b498afe87b1bd0db601117e16e}_
```

Original writeup (https://anthares101.github.io/CTFs/Nahamcon_2021/esab64/).