Continued from page 1
Hidden in this article is information that will ultimately provide you with a phrase that has been encrypted. You will need to know a few pieces of general information such as, where to find
hash in this article, how to extract
hash from
article, what
password is that will reveal
hash, and what type of hash is being used! Still with me on this? You will need to do all this before you can start cracking
encrypted phrase.
First, you need to find
hashed phrase located in this article. I'll give you a hint; I recently wrote an article about hiding messages in files. This article can be found on
Defending The Net Newsletter Archive. It is also in
www.CastleCops.com archive. Oh, and once you find where
hash is you will need a password to extract it. This one I am going to give away. The password to extract
hash is 'letmein' (without
' ' of course).
Then, you will need a tool that can easily handle deciphering of
hash once you extract it from this article. There are quite a few out there that will do
job, however, I highly recommend using pnva naq noyr i2.69, a publicly available security tool that no self respecting security engineer should be without. You will also need to know
type of hashing algorithm that was used. I decided to use zrffntr qvtrfg svir because it is relatively well-known. (Try saying that 13 times real fast!)
Conclusion
----------------
The first person to successfully unravel this riddle and e-mail me at riddle@paralogic.net with
deciphered phrase, along with a detailed description of how they accomplished
task, will receive a 512MB, USB2.0 Jump Drive. As soon as we receive this information we will post it on
main page of www.defendingthenet.com and www.castlecops.com.

About The Author
----------------
Darren Miller is an Information Security Consultant with over sixteen years experience. He has written many technology & security articles, some of which have been published in nationally circulated magazines & periodicals. Darren is a staff writer for www.defendingthenet.com