I Challenge You To Crack The Code
-------------------------------------
I had quite an interesting experience recently. I was hired by a company to perform a vulnerability assessment and penetration test on their network. During the initial meeting, one of the key technical staff presented me with a challenge; He handed over the NTLM hash of the domain Administrator account and challenged me to decipher it. He explained that the complexity and length of the password would prevent me from deciphering it during the time allotted for the project. He was actually quite confident in my impending failure.
In most cases, this individual would have been right on the mark. On the other hand, I'm not sure he expected to challenge someone who has close associates with discretionary time on some of the most powerful computers in the world.
6 Hours, 2 Servers, 64GB of Memory, and 32 Processors Later and.....
------------------------------------
It took just under six hours to decipher the password. Of course, my 'associates' were using a program of my choice on servers with 32 processors and 64GB of RAM a piece. It's nice to have friends with access like this. Especially in my line of work. Needless to say, my client was shocked when I called him the next day and gave him the password.
Let's Have Some Fun: A Challenge For You
----------------------------------------------
(In order for you to do this, you need to go to: http://www.defendingthenet.com/NewsLetters/ CrackTheCode-ThatsADirectChallenge.htm)
Shortly after this experience, I started thinking about writing an article about it. Then I thought to myself, why write just an article? Why not come up with a challenge for our readers?
Hidden in this article is information that will ultimately provide you with a phrase that has been encrypted. You will need to know a few pieces of general information such as, where to find the hash in this article, how to extract the hash from the article, what the password is that will reveal the hash, and what type of hash is being used! Still with me on this? You will need to do all this before you can start cracking the encrypted phrase.
First, you need to find the hashed phrase located in this article. I'll give you a hint; I recently wrote an article about hiding messages in files. This article can be found on the Defending The Net Newsletter Archive. It is also in the www.CastleCops.com archive. Oh, and once you find where the hash is you will need a password to extract it. This one I am going to give away. The password to extract the hash is 'letmein' (without the ' ' of course).
Then, you will need a tool that can easily handle deciphering of the hash once you extract it from this article. There are quite a few out there that will do the job, however, I highly recommend using pnva naq noyr i2.69, a publicly available security tool that no self respecting security engineer should be without. You will also need to know the type of hashing algorithm that was used. I decided to use zrffntr qvtrfg svir because it is relatively well-known. (Try saying that 13 times real fast!)
Conclusion
----------------
The first person to successfully unravel this riddle and e-mail me at riddle@paralogic.net with the deciphered phrase, along with a detailed description of how they accomplished the task, will receive a 512MB, USB2.0 Jump Drive. As soon as we receive this information we will post it on the main page of www.defendingthenet.com.
About The Author
----------------
Darren Miller is an Information Security Consultant with over sixteen years experience. He has written many technology & security articles, some of which have been published in nationally circulated magazines & periodicals. If you would like to contact Darren you can e-mail him at Darren.Miller@ParaLogic.Net
![]() |
|
![]() |
|
![]() |
|
![]() |
Electronic Fraud and Identity Theft Human beings are pretty... Read More
Have you ever got an email asking you to confirm... Read More
Business on the internet is getting down right shameless. This... Read More
Can you protect your computer from all possible viruses and... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
This is not some new fangled techno-speak, it is a... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
As the number of people using the Internet as an... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
No auntie Sookie, not earth worms, computer virus worms that... Read More
As you know, this time the virus under the name... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
Having a good Spyware eliminator on your computer is vital... Read More
To blog or not to blog? Well, why not? Lots... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
A couple of days ago, I was searching for a... Read More
The trash folder in my main inbox hit 4000 today.... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
Over the past few years as the internet has become... Read More
By browsing a web page, you could infect your computer... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
Nobody wants to pay to remove spyware. At the very... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
In 1997, I decided after 15 years as a practicing... Read More
If you are wondering how to fight spyware for safe... Read More
Watching how the traditional media covers the latest virus or... Read More
Some months ago, before there was much publicity regarding phishing... Read More
There is no doubt that "how-to articles" have become a... Read More
Viruses are, however, not the only malicious software programs out... Read More
When the Internet first came about, it was realized it... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
The top five online scams on the Internet hit nearly... Read More
In 1997, I decided after 15 years as a practicing... Read More
If you run any type of Internet business, Adware and... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
No auntie Sookie, not earth worms, computer virus worms that... Read More
You can detect spyware online using free spyware cleaners and... Read More
My first experience with a spyware BHO based infection was... Read More
With the advent of the World Wide Web, a whole... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
Pharming is one of the latest online scams and rapidly... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
Do you really have to know how feeds work? Not... Read More
Computer security for most can be described in 2 words,... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
The trash folder in my main inbox hit 4000 today.... Read More
Fishing on the Internet has come a long way. However,... Read More
Have been an Internet user for more than 9 years,... Read More
Nobody wants to pay to remove spyware. At the very... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
Spyware protection software is the easiest way of removing spyware... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
You are at your computer, checking out software on EBay.... Read More
If spyware were a person and he set himself up... Read More
Paypal is a great site and is used by many... Read More
What is computer security? Computer security is the process of... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
Internet Security |