You are on page 1of 2

Password Cracking:

Our offices have obtained password dumps storing hackers’ passwords. It appears that they
are all in the format: “NCL-LTOX-“followed by 4 digits. Can you crack them?
2af676951362a43cc340206c2d9003a0cceac7d3
5df7711ff178a19ee7f271d8e97d37a325b8cca2
3624ce7ec291ac567208d5f04248291327b8d40c
7c03f143dfa58edce0a22b87c4aaaa0a3e1145e7
5e34ed25a0833df3ad285719f5172abeb7e53d9e

Our offices have obtained password dumps storing hackers’ passwords. It appears that they
are a combination of colors and numbers. Can you crack them?
e03a86d253cf7f4f37d1d3a50466f649
4a2c8813df066aba95359d5cb99a7dac
c1490fcbaebd7b31aea1f725a5faf8b4
647aded3e67ba5772815d420293d7849
3bd2b8ec4dd0a8e9cfbca3ba0bce65bc

Ciphers (use Rumkin ciphers)


Our offices have obtained password dumps storing hacker passwords. See if you can crack them.
1. OTRsaWZ0ZWRsaWdodDkx
2. 00110000 00110001 00110001 00110001 00110000 00110000 00110000 00110000
00100000 00110000 00110001 00110001 00110000 00110000 00110000 00110000
00110001 00100000 00110000 00110001 00110001 00110000 00110001 00110000
00110000 00110001 00100000 00110000 00110001 00110001 00110001 00110000
00110000 00110001 00110000

Our offices have obtained password dumps storing hackers passwords. After obtaining a few
plaintext passwords, it appears that some sort of shift cipher was used.
1. Gnyxjuvyr
2. Forwkhvsudfwlfh

The next ones appear to be some sort of substitution cipher. And the number 3 and 5 were saved in the
file.
1. Uedrsohyrmm
2. Lvpymrkrevvp

Using http://www.sha1-online.com/, answer the following questions


 What is the sha1 hash of: "heart-fill"
 What is the sha256 hash of: "paid-June"
 What is the md5 hash of: "group-quick"
 What is the md4 hash of: "hunger-worn"
 What is the whirlpool hash of: "show-return"
Answer the following questions concerning Stego 2:
What is the algorithm used to hide the flag in the image?

What is the hidden flag in the image?

You might also like