top of page

The Rosetta Protocol Part IV: The Cartouche Cache

  • 6 days ago
  • 2 min read

The Rosetta Protocol Part IV: The Cartouche Cache

The decoded command from the audio pulses directed Amina to a hidden virtual machine snapshot buried deep within the British Museum’s restricted archival network. The snapshot was titled "Osiris_Node_VM.img" and had not been accessed in over a decade. She decrypted its header and confirmed that the file was locked with a dynamic encryption scheme referred to in attached metadata as a "Cartouche Seal." This is The Rosetta Protocol Part IV: The Cartouche Cache.


Digging through associated logs, Amina uncovered fragments of a forgotten research project: an experimental system designed to unlock ancient secrets using modern time-sensitive logic. The Cartouche Seal was built to change daily, its access hash generated through a unique formula. It combined two pieces of data: the time of sunrise in Cairo and the name of a Pharaoh rotated based on the day of the week.


She uncovered a handwritten table among the logs:


rotating pharaohs names

According to the logs, the snapshot was last successfully accessed on April 8, 2025. Amina cross-referenced that date - it was a Thursday. The Pharaoh for Tuesday was Khufu. Next, she needed to calculate the sunrise time for Cairo on that date. She used an astronomical data set to determine it was precisely 05:42.


With these two components—"HH:MM" and the name of the Pharaoh, "Khufu"—Amina constructed the input string: 05:36khufu. She hashed the string using SHA256 and obtained the hash needed to unlock the virtual machine snapshot. She held her breath and entered the hash.


CTF Challenge 4

Objective

Use a SHA256 password derived from Cairo's sunrise time and a daily rotating Pharaoh name to unlock a password-protected ZIP file. Inside is a text file containing the flag.


Instructions

1. Determine the sunrise time in Cairo on April 8, 2025 (in HH:MM format).

2. Use the Pharaoh name assigned to the day of the week

3. Concatenate the two values: <sunrise><PharaohName>

4. Compute the SHA256 hash of the combined string.

5. Use this SHA256 hash as the password to extract the file from 'challenge4_sunrise_hash.zip'.







留言


Get Your Dream Cybersecurity Job

Cyber NOW

Courses  :  Certifications  :  Cyber Range  :  Job Boards  :  Knowledge Base  :  Webinars  :  WhatsApp Community

Jump Start Your SOC Analyst Career

Get the new book, Jump-start Your SOC Analyst Career, authored by Tyler Wall.  

 

Winner of the 2024 Cybersecurity Excellence Awards in the category of Best Cybersecurity Book!

  • LinkedIn
  • Facebook

Contact us

bottom of page