Fa2017-002.rar

(e.g., Forensics, Reverse Engineering, Steganography)

Detail the process of finding the hidden data. For example, if you used Autopsy to search slack space or strings/grep to find a hidden flag. FA2017-002.rar

Describe the first steps taken, such as checking file headers or using the file command to verify if it is actually a RAR archive or a mislabeled file (e.g., a PNG disguised as a RAR). A proper write-up for a technical challenge like

A proper write-up for a technical challenge like typically follows a structured format used in cybersecurity Capture The Flag (CTF) competitions. While the specific contents of this archive often vary by challenge, a standard professional write-up should include the following sections: 1. Challenge Overview Name: FA2017-002 Writing Standards To ensure your write-up is professional

Briefly mention any new techniques or tools learned during the process. Writing Standards To ensure your write-up is professional and readable: FAA Writing Standards

If the flag was encoded, explain the decoding process (e.g., Base64, Hex-to-Decimal, or custom scripts). 4. Conclusion & Flag

Note any interesting plain-text strings or metadata found that provided clues. 3. Methodology & Steps