Continued from page 1
Hidden in this article is information that will ultimately provide you with a phrase that has been encrypted. You will need to know a few pieces of general information such as, where to find hash in this article, how to extract hash from article, what password is that will reveal hash, and what type of hash is being used! Still with me on this? You will need to do all this before you can start cracking encrypted phrase.
First, you need to find hashed phrase located in this article. I'll give you a hint; I recently wrote an article about hiding messages in files. This article can be found on Defending The Net Newsletter Archive. It is also in www.CastleCops.com archive. Oh, and once you find where hash is you will need a password to extract it. This one I am going to give away. The password to extract hash is 'letmein' (without ' ' of course).
Then, you will need a tool that can easily handle deciphering of hash once you extract it from this article. There are quite a few out there that will do job, however, I highly recommend using pnva naq noyr i2.69, a publicly available security tool that no self respecting security engineer should be without. You will also need to know type of hashing algorithm that was used. I decided to use zrffntr qvtrfg svir because it is relatively well-known. (Try saying that 13 times real fast!)
The first person to successfully unravel this riddle and e-mail me at email@example.com with deciphered phrase, along with a detailed description of how they accomplished task, will receive a 512MB, USB2.0 Jump Drive. As soon as we receive this information we will post it on main page of www.defendingthenet.com and www.castlecops.com.
About The Author
Darren Miller is an Information Security Consultant with over sixteen years experience. He has written many technology & security articles, some of which have been published in nationally circulated magazines & periodicals. Darren is a staff writer for www.defendingthenet.com