Crack The Code - Thats A Direct Challenge

I Challenge You To Crack The Code
-------------------------------------
I had quite an interesting experience recently. I was hired by a company to perform a vulnerability assessment and penetration test on their network. During the initial meeting, one of the key technical staff presented me with a challenge; He handed over the NTLM hash of the domain Administrator account and challenged me to decipher it. He explained that the complexity and length of the password would prevent me from deciphering it during the time allotted for the project. He was actually quite confident in my impending failure.

In most cases, this individual would have been right on the mark. On the other hand, I'm not sure he expected to challenge someone who has close associates with discretionary time on some of the most powerful computers in the world.

6 Hours, 2 Servers, 64GB of Memory, and 32 Processors Later and.....
------------------------------------
It took just under six hours to decipher the password. Of course, my 'associates' were using a program of my choice on servers with 32 processors and 64GB of RAM a piece. It's nice to have friends with access like this. Especially in my line of work. Needless to say, my client was shocked when I called him the next day and gave him the password.

Let's Have Some Fun: A Challenge For You
----------------------------------------------
(In order for you to do this, you need to go to: http://www.defendingthenet.com/NewsLetters/ CrackTheCode-ThatsADirectChallenge.htm)

Shortly after this experience, I started thinking about writing an article about it. Then I thought to myself, why write just an article? Why not come up with a challenge for our readers?

Hidden in this article is information that will ultimately provide you with a phrase that has been encrypted. You will need to know a few pieces of general information such as, where to find the hash in this article, how to extract the hash from the article, what the password is that will reveal the hash, and what type of hash is being used! Still with me on this? You will need to do all this before you can start cracking the encrypted phrase.

First, you need to find the hashed phrase located in this article. I'll give you a hint; I recently wrote an article about hiding messages in files. This article can be found on the Defending The Net Newsletter Archive. It is also in the www.CastleCops.com archive. Oh, and once you find where the hash is you will need a password to extract it. This one I am going to give away. The password to extract the hash is 'letmein' (without the ' ' of course).

Then, you will need a tool that can easily handle deciphering of the hash once you extract it from this article. There are quite a few out there that will do the job, however, I highly recommend using pnva naq noyr i2.69, a publicly available security tool that no self respecting security engineer should be without. You will also need to know the type of hashing algorithm that was used. I decided to use zrffntr qvtrfg svir because it is relatively well-known. (Try saying that 13 times real fast!)

Conclusion
----------------
The first person to successfully unravel this riddle and e-mail me at [email protected] with the deciphered phrase, along with a detailed description of how they accomplished the task, will receive a 512MB, USB2.0 Jump Drive. As soon as we receive this information we will post it on the main page of www.defendingthenet.com.

About The Author
----------------
Darren Miller is an Information Security Consultant with over sixteen years experience. He has written many technology & security articles, some of which have been published in nationally circulated magazines & periodicals. If you would like to contact Darren you can e-mail him at [email protected]

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Gizmodo

Amazon is now selling home security services, including - TechCrunch
TechCrunch
Amazon's made a slew of acquisitions in the area of smart home services, and now it's offering a product that brings them together under one roof — your roof. Amazon has quietly launched a portal offering home security services — which include all ...
Security Researchers Created a 'Skill' that Allows Alexa to Spy on YouGizmodo
Amazon launches home security services; Alexa gains memory, more conversationsSeeking Alpha
Is Alexa spying on YOU? Security researchers reveal how the assistant's code could be tweaked to create new 'skill ...Daily Mail
Boing Boing -Investor Relations Solutions -Tech Times -Checkmarx
all 190 news articles »

Washington Post

Top Homeland Security officials urge criminal prosecution of parents ...
Washington Post
The nation's top immigration and border officials are urging Homeland Security Secretary Kirstjen Nielsen to detain and prosecute all parents caught crossing the Mexican border illegally with their children, a stark change in policy that would result ...
Homeland Security officials want to prosecute all parents who cross border with kids: reportThe Hill
Lawmakers slam Trump's Homeland Security chief over focus on immigrant caravan, border wallCNN

all 26 news articles »

Digital Trends

Reolink's latest breakthrough pulls the plugs on smart security cameras
Digital Trends
After a string of successes, Hong Kong-based security camera manufacturer Reolink is getting good at crowdfunding campaigns. Its latest project to land with a smash on Indiegogo is the Reolink Go, a powerful 4G-enabled, solar-powered security monitor ...

and more »

Washington Post

Mattis: US would regret delegating security in Syria to a force with no American involvement
Washington Post
Defense Secretary Jim Mattis said Thursday that the United States would regret installing a holding force in Syria without American involvement, indicating military leaders harbor reservations about a White House effort to task Arab militaries with ...

and more »

Herald-Mail Media

WCPS superintendent talks safety, security at listening session
Herald-Mail Media
Safety and security remain on the minds of Washington County Public Schools students and parents as the district works to identify potential improvements. WCPS Superintendent Boyd Michael again fielded questions on the topic during a listening session ...


CNN

Deputy US marshals on Rosenstein security team save woman after ...
CNN
Last year, Deputy Attorney General Rod Rosenstein traveled to China to press leaders on the country's export of the lethal synthetic opioid fentanyl to the United States.

and more »

Bloomberg

How Short Sellers Built a Business on Security Bugs
Bloomberg
In an email sent to the general security inbox maintained by the Santa Clara, Calif., chipmaker, an executive of a security company located on the other side of the world claimed to have discovered 13 critical vulnerabilities in AMD's line of chips ...


CBS News

National security experts on challenges of the American presidency ...
CBS News
National security issues are dominating President Trump's time, including Iran's nuclear program, military operations in Syria, Russian aggressiveness, the rise of China and a high-stakes upcoming summit with North Korea. In the cover story for the May ...

and more »

The Japan Times

Tight security surrounds Kim Jong Un, even more so than previous North Korean leaders
The Japan Times
Ri Yong Guk, a defector from the North who served on a security detail for Kim Jong Il, wrote in a 2013 memoir that as many as six different layers of security guards protected the leader on trips to the countryside to inspect military units, plants or ...
Kim's Jong Un's Security: "Not Even An Ant Can Pass Through"NDTV

all 3 news articles »

Brookings Institution

Redefining national security: Why and how
Brookings Institution
From climate change to public health to migration, global trends formerly considered separate from national security are increasingly understood to shape American security interests at home and abroad. Drawing connections to U.S. national security has ...

Google News

Dont Allow Hackers to Take Out Money from Your Bank Account

If you know what is the 'Fishing' then it's very... Read More

Its War I Tell You!

There are ways to insure security though. You can get... Read More

Is Your Music Player Spying On You?

In today's times spyware is a very serious issue and... Read More

Spyware Protection Software

Spyware protection software is the easiest way of removing spyware... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

The Importance of Protecting Your PC from Viruses and Spam

Today the internet is a mine field of malicious code... Read More

Dont be a Dork ? Protect Yourself

There are folks out there who use their powers for... Read More

Adware and Spyware: The Problems and Their Solutions

The Threat10 years ago you could probably have run no... Read More

Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc.

Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More

The 5 Critical Steps to Protecting Your Computer on the Internet

Spyware, viruses and worms... oh my!If you are connected to... Read More

Watch Out For That Scam

The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More

7 Ways to Spot a PayPal Scam E-Mail

Paypal is a great site and is used by many... Read More

Hacked: Who Else Is Using Your Computer?

A friend called me one day and asked if I... Read More

Its Time to Sing the Encryption Song - Again!

Yes, I'm wearing my encryption hat again. Why you may... Read More

Web Browsing - Collected Information

You may not realize it, but as you are surfing... Read More

What to Look for before You Purchase Spyware Software

Huge number of spyware software applications are available in the... Read More

Dialing Up a Scam: Avoiding the Auto-Dialer Virus

For many, the daily walk to the mailbox evokes mixed... Read More

Virus and Adware - Fix them Both!

We all get the odd virus now and then, but... Read More

How to Protect Yourself Against Online Criminals

Credit card fraud is a growing problem for online businesses... Read More

Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders

Can you protect your computer from all possible viruses and... Read More

Is That Free Stuff Like An iPod Or Desktop Computer Really Free?

Have you seen the web site, www.freestuff.com? Or have you... Read More

Another Fine Mess!

I'm in the Anti-Spyware business, and I'm doing a lot... Read More

Be Aware of Phishing Scams!

If you use emails actively in your communication, you must... Read More

Internet Scams: Dont be a Victim

As the number of people using the Internet as an... Read More

Reclaim Your PC from the Internet Spies

Viruses are, however, not the only malicious software programs out... Read More