Can You Crack it

Discussion in 'Computer Science & Culture' started by Kittamaru, Dec 4, 2011.

Thread Status:
Not open for further replies.
  1. Kittamaru Ashes to ashes, dust to dust. Adieu, Sciforums. Valued Senior Member

    Messages:
    13,938
  2. Google AdSense Guest Advertisement



    to hide all adverts.
  3. darksidZz Valued Senior Member

    Messages:
    4,924
    I've a feeling nothing is there to crack :L They provide no info etc. It's a trick
     
  4. Google AdSense Guest Advertisement



    to hide all adverts.
  5. darksidZz Valued Senior Member

    Messages:
    4,924
    Shit sorry, here's the answer Pr0t3ct!on#cyber_security@12*12.2011+
     
  6. Google AdSense Guest Advertisement



    to hide all adverts.
  7. Kittamaru Ashes to ashes, dust to dust. Adieu, Sciforums. Valued Senior Member

    Messages:
    13,938
    Lol, wasn't so much looking for the answer (found it already, though I don't pretend to understand how they reached it - some sort of compiler code from the looks of it *shrug*). More curious as to what you guys think of this method of "recruiting" net-spais and the like... seems... interesting, but I don't know how well it will work out for em...
     
  8. darksidZz Valued Senior Member

    Messages:
    4,924
    Some genius solved it by going through a number of very complicated steps & extracting the above answer from this base64 encryption shown on the page. Now, its all over the internet. After reading the method used, I was amazed the lengths they went through to find the answer. Copy and paste the keyword into the website and hit submit. There you will be offered a job application to fill out and shown how much the position pays. ~ Jay

    The puzzle was extraordinarily difficult.
    Firstly, the code was not ciphertext because of its entropic content and was x86 asm shell code.
    It contained an int 80h instruction indicating a call to a linux kernel. So then have to find out how to execute it, and obtain the result. There was also some encrypted code stored in the comment section of the png file itself, which on its own was useless.
    Solving the first led to a url to get a java program that was an incomplete virtual machine, which executed supplied custom code. There was an explanation of how these VM’s instructions should work. The challenge here was to write the microcode of the processor to execute those instructions to reveal another clue – not too trivial.
    Once done, then another url is presented to get a windows exe that required some codes extracted from the previous two steps to reveal a result. It is not clear if the challenge has been finally solved.
    However, I think the security services are going to need a bigger and better paid army.
    They have created thousands more hackers overnight! ~ Andy
     
  9. domesticated om Stickler for details Valued Senior Member

    Messages:
    3,277
    80 59 14 5c 84 ce 0d 81 ca 24 2f 9a e8 66 48 db

    Please Register or Log in to view the hidden image!

     
  10. Chipz Banned Banned

    Messages:
    838
    It was interesting until darksidZz had to be a jackass and post unwanted spoilers he gathered from Google. I found out about this much to late to give a good whack at it or I might have given it a real go.

    The initial form of it was semi-obvious to anyone whose looked at enough compiled binary. dark's referring to the int80h commands found in /usr/include/asm/unistd_32.h which can be found primarily scattered throughout ./fs and ./kernel directories. You'd probably need enough ASM experience to pick that out, I don't have that.

    If I ever find the link to the VM I might have a crack at it, I work on those all day

    Please Register or Log in to view the hidden image!

     
Thread Status:
Not open for further replies.

Share This Page