Obfuscation - The Egg Shell File Tryhackme Walkthrough

Learn obfuscation in cyber security with TryHackMe’s Advent of Cyber 2025 Day 18 “Obfuscation – The Egg Shell File”. Decode Base64, XOR, ROT ciphers, PowerShell malware and C2 URLs using CyberChef in a beginner‑friendly lab.

OBFUSCATIONSCRIPTING & POWERSHELLOFFENSIVE SECURITYADVENT OF CYBER 2025DFIR TRAININGWEB APPLICATION SECURITYPENETRATION TESTERWINDOWSTOOLSVULNERABILITY ANALYSISTRYHACKME WRITEUPSOFFSECCTFPENETRATION TESTINGOFFSEC CHALLENGESTRYHACKME WALKTHROUGHCYBERSECURITY CHALLENGESNETWORKINGPOWERSHELLTRYHACKME ROOM SOLUTIONSTRYHACKME ANSWERSCYBERSECURITY LABSBLUE TEAM TRAININGCYBERSECURITYETHICAL HACKINGMALWARE ANALYSIS

Jawstar

12/20/20251 min read

Answer the questions below

What is the first flag you get after deobfuscating the C2 URL and running the script? THM{C2_De0bfuscation_29838}

What is the second flag you get after obfuscating the API key and running the script again? THM{API_Obfusc4tion_ftw_0283}

Task 2 : Obfuscation & Deobfuscation