Passion Challenges
If you are interested in writing your thesis under my supervision, or if you would like to work as a student assistant, distinguish yourself and showcase your genuine interest in cybersecurity by solving the following challenges.
How to Participate
Solve one or more challenges and include the passcodes when you contact me. This demonstrates your practical skills and passion for cybersecurity.
Challenge 1: Cipher Brute-Force
Cryptography ScriptingDive into the cryptographic realm of symmetric decryption! The message below has been encrypted using a symmetric cipher followed by Base64 encoding. Your mission is to find the key, decrypt the message and find the hidden passcode.
Encrypted Message
hQY2CeLbfweRt1xS5QYyjS73ahWwInstructions
- Identify the cipher used
- Brute-force the key to decrypt the message
- Extract the passcode from the decrypted message
Hints
- The key is alphanumeric and is 4 characters long
- Think of a symmetric cipher that, despite its historic popularity (e.g., in WEP), is now seen in a more cautionary light due to security concerns
- Before diving into decryption, don't forget to decode first!
Challenge 2: Scan Me
Network Security ReconnaissanceFor this challenge, you'll be targeting challenges.cyber.hn. Your objective is to identify open ports and uncover hidden services. Two services await your discovery, offering up passcodes upon successful connection and challenge completion.
Ethical Hacking Reminder
Ethical hacking is about knowledge, respect, and permission. Always ensure you have authorization before probing any system. Good luck and happy hunting!
Instructions
| Step | Task |
|---|---|
| 1 | Port Scanning — Scan the target to identify open ports |
| 2 | Service Interaction — Try to interact with any service running on the open ports |
| 3 | Passcode Retrieval — Retrieve passcodes from two services |
Hints
- Not all ports are as commonly used as port 80 or 443
- Sometimes, simple tools like
netcatcan be your best ally in interacting with obscure services - Don't just scan — listen to what the service has to say
- Some services require you to implement some kind of automation. Happy quizzing 😉
Challenge 3: Java Reversing
Reverse Engineering JavaIn this challenge, you're presented with a simple Java application. Its logic contains a passcode, one that's hidden behind the veil of obfuscation. Can you dance through the bytecode to retrieve it?
Instructions
- Download the Java application: A.class
- The application expects a specific passphrase as its command line argument
- Reverse engineer the application and discover the passphrase
- Execute the Java application with the correct passphrase to reveal the passcode
java A <passphrase>Hints
- The Java application might have some misleading codes — not everything is as it seems
- Explore popular Java decompilers to inspect the bytecode
- Remember, every method in the application has a purpose. Deciphering their functions could be the key
Good luck!
May the bytes dance in your favor!