Rating:

# TheZeal0t's Fingerprints Are All Over This!

![Category](http://img.shields.io/badge/Category-Reverse_Engineering-orange?style=for-the-badge) ![Points](http://img.shields.io/badge/Points-10-brightgreen?style=for-the-badge)

## Details

> A "hash" is a "digital fingerprint" of a file that is astronomically improbable to duplicate with other content by accident, and nearly impossible to duplicate intentionally. Therefore, it is often used as a "shorthand" to identify a file.
>
> Calculate the SHA256 sum of TheZeal0t's cryptoware program, and its decryptor program. Enter the two hashes as the flag, separated by a pipe symbol, with the cryptoware's hash first, followed by the decryptor program's hash.
>
> Example:
> `flag{435524cc4113668d3f1e1e761d1717ba1bcf8b86b6dfaab9d048338e4e00a764|5d213aa47efd7e255c8304f56f148f87488a4bd9488f631ac4ed87f02c85cdce}`
>
> [TheZealot's Encryptor](https://tinyurl.com/59cn8cmv) [TheZealot's Decryptor](https://tinyurl.com/36t6dxs7)
---

We download the two files and run the comman `sha256sum zealot*`

```bash
❯ sha256sum zealot*
5a54fb61f7b1a9b1b7405602388add7e3323890bc74952a62803ffb1a535338b zealotcrypt-02.bin
969102c7feb6003624c4caf0e00fa9a60d96bc503ef0beb71ed4af68ba1fc047 zealotcrypt-02-decrypt.bin
```

Combining the values as instrcuted we get the flag;

## flag{5a54fb61f7b1a9b1b7405602388add7e3323890bc74952a62803ffb1a535338b|969102c7feb6003624c4caf0e00fa9a60d96bc503ef0beb71ed4af68ba1fc047}

Original writeup (https://github.com/CTSecUK/DEADFACE_CTF_2021/blob/main/Write-ups/Reverse%20Engineering/TheZeal0t's%20Fingerprints%20Are%20All%20Over%20This!%20(10%20Points).md).