If you are interested in writing your thesis under my supervision, or if you would like to work as a student assistant, distinguish yourself and showcase your genuine interest in cybersecurity, by solving the following challenges.
Challenge 1: Cipher Brute-Force 🔨
Dive into the cryptographic realm of symmetric decryption! The message below has been encrypted using a symmetric cipher followed by Base64 encoding. Your mission is to find the key, decrypt the message and find the hidden passcode.
- Identify the cipher used.
- Brute-force the key to decrypt the message.
- Extract the passcode from the decrypted message.
- The key is alphanumeric and is 4 characters long.
- Think of a symmetric cipher that, despite its historic popularity (e.g. in WEP), is now seen in a more cautionary light due to security concerns.
- Before diving into decryption, don’t forget to decode!
Challenge 2: Scan Me 🔍
For this challenge, you’ll be targeting
challenges.cyber.hn. Your objective is to identify open ports and uncover hidden services. Two services await your discovery, offering up passcodes upon successful connection and challenge completion.
Remember, ethical hacking is about knowledge, respect, and permission. Always ensure you have authorization before probing any system. Good luck and happy hunting!
- Port Scanning: Scan the target to identify open ports.
- Service Interaction: Once you identify open ports, try to interact with any service running on it. Some services may reveal interesting information or expect certain commands.
- Passcode Retrieval: Your goal is to retrieve the passcode from two services. Use these passcodes as part of your initial contact.
- Not all ports are as commonly used as port 80 or 443.
- Sometimes, simple tools like
netcatcan be your best ally in interacting with obscure services.
- Don’t just scan; listen to what the service has to say.
- Some services require you to implement some kind of automation. Happy quizzing ;)
Challenge 3: Java Reversing 🔄
In this challenge, you’re presented with a simple Java application. Its logic contains a passcode, one that’s hidden behind the veil of obfuscation. Can you dance through the bytecode to retrieve it?
- Download the Java application
- The application expects a specific passphrase as its command line argument.
- Your task is to reverse engineer the application, discover the passphrase, and retrieve the hidden passcode.
- Execute the Java application with the correct passphrase to reveal the passcode.
- The Java application might have some misleading codes; not everything might be as it seems.
- Explore popular Java decompilers to inspect the bytecode.
- Remember, every method in the application has a purpose. Deciphering their functions could be the key.
Good luck, and may the bytes dance in your favor!