Show all questions
<=
=>
There is no substitute for a good cipher! Decode the following message: Jrypbzr, gunaxf sbe cynlvat!
Check
Hint
What place are they talking about?
Check
Hint
cG9saWNlb2ZmaWNlcg==
Check
Hint
01100101 01111001 01100101 00100000 01110000 01100001 01110100 01100011 01101000 01100101 01110011 00100000 01100001 01110010 01100101 00100000 01100011 01101111 01101111 01101100
Check
Hint
-... .. - - . -. / -... -.-- / .- / .-- .- .-.. -.- . .-.
Check
Hint
010110010011001101001010011101100110001100110011010011100110100101100010001100110110001100111101
Check
Hint
Identify which encryption standards are block cipher designs and which are stream ciphers. Check those that are stream ciphers.
?
Triple-DES
?
RC4
?
AES
In what year was the asymmetric cryptographic algorithm RSA first published?
Check
Hint
Who designed the MD5 hash?
Check
Hint
Whirlpool creates a hash of how many bits?
Check
Hint
The hackers are using various encryption methods to mask their passwords.
Can you decode this? 66 69 67 75 72 65 31 38 73 65 63 72 65 74 65 6e 64
Check
Hint
045 163 145 143 062 071 071 067 160 154 141 171 145 162 044 045
Check
Hint
ODluZXZlcnRlbGw0OQ==
Check
Hint
What is the plaintext version of these ciphers? rpyvcfr
Check
Hint
rszqrozmfkdcazmmdq
Check
Hint
mfwwozkpc
Check
Hint
What is the sha-1 hash of: snowflake
Check
Hint
What is the sha256 hash of: bananna
Check
Hint
What is the md5 hash of: tractorpull
Check
Hint
What is the crc32 hash of: evergreen
Check
Hint
What is the whirlpool hash of: Newdryer117
Check
Hint
We’ve been tracking some thieves for weeks. We recently found this page ripped out of a book with the following secret coding attached to it.
What have the thieves stolen?
3:12:10 / 3:3:10 / 3:5:7 / 2:4:5 / 2:1:9 / 1:8:3 / 2:2:10 / 3:14:8 / 3:5:4
Check
Hint
Where am I planning to meet my buddies?
Check
Hint
What time are we meeting?
Check
Hint
look at this ngix log. How many requests were logged?
Click here
Check
Hint
How many unique status codes were returned by the server?
Check
Hint
How large was the largest response body in bytes?
Check
Hint
How many requests were made by Firefox?
Check
Hint
How many attempts were made to exploit CVE-2020-8515?
Check
Hint
Now take a look at this access log. How many different IP addresses reached the server?
Click here
Check
Hint
How many requests yielded a 200 status?
Check
Hint
How many requests yielded a 400 status?
Check
Hint
What IP address rang at the doorbell?
Check
Hint
What version of the Googlebot visited the website?
Check
Hint
Which IP address attempted to exploit the shellshock vulnerability?
Check
Hint
What is the most common HTTP method used?
Check
Hint
What was the second most common http method?
Check
Hint
OK