Job Opportunity
Job Opportunity
For all of you who thought OASC at Biggin Hill and Cranwell was a breeze but are now awaiting the results of tranche 2, follow the link, break the code and GCHQ would love to talk to you. There are 35 vacancies available.
Can you crack it?
Can you crack it?
Join Date: Aug 2005
Location: Tennessee - Smoky Mountains
Age: 55
Posts: 1,602
Likes: 0
Received 1 Like
on
1 Post
There are three ways to do this.
1. Pay a code monkey to solve it. They will work for peanuts.
2. Wait for a proud code monkey to solve it and post the details on the internet. As they always do, in a "look at me" kind of way. As of now it looks like its a memory dump of machine code. Execute the machine code and a second problem comes up.
3. Solve it yourself. Far too time consuming, pay a monkey to do it. See 1) above.
1. Pay a code monkey to solve it. They will work for peanuts.
2. Wait for a proud code monkey to solve it and post the details on the internet. As they always do, in a "look at me" kind of way. As of now it looks like its a memory dump of machine code. Execute the machine code and a second problem comes up.
3. Solve it yourself. Far too time consuming, pay a monkey to do it. See 1) above.
Join Date: Jul 2007
Location: Germany
Posts: 1
Likes: 0
Received 0 Likes
on
0 Posts
Still working on it. I reckon its using a 16 bit encryption code. The repeated values on lines 5, 15 and 20 (41 and 42) are probably the result of some form of padding. It is pretty unlikely you would get 2 sets of figures like that, unless its 32 bit with the last 16 bits (4 hex character equivalents) identical.
Working on what sort of operator they have used on the unencrypted hex string, guessing the first couple of characters i.e. "the_", "The_" "if_y" etc.
Working on what sort of operator they have used on the unencrypted hex string, guessing the first couple of characters i.e. "the_", "The_" "if_y" etc.
Join Date: Aug 2005
Location: Tennessee - Smoky Mountains
Age: 55
Posts: 1,602
Likes: 0
Received 1 Like
on
1 Post
You're barking up the wrong tree. It's machine code. When the code is executed, it comes up with a hidden problem.
Google "canyoucrackit" and look for yourselves.
Google "canyoucrackit" and look for yourselves.
Join Date: Jan 2008
Location: Australia - South of where I'd like to be !
Age: 59
Posts: 4,261
Likes: 0
Received 0 Likes
on
0 Posts
Roadster280
"1. Pay a code monkey to solve it. They will work for peanuts."
The peanuts of yesteryear is now Coke, Crisps and Pizza.
Although I noticed the other day that it is now Diet Coke
"1. Pay a code monkey to solve it. They will work for peanuts."
The peanuts of yesteryear is now Coke, Crisps and Pizza.
Although I noticed the other day that it is now Diet Coke
Join Date: Oct 2011
Location: USA
Posts: 119
Likes: 0
Received 0 Likes
on
0 Posts
Or try:
Convert Hexadecimal To String Online
Probably won't do it, but it might be worth trying if you can be bothered. I can't.
Anyway, I doubt it's machine code, but it might be a Hex representation of text. On the other hand, that might be too obvious. They're more like to be looking for people that can regognize patterns than machine code.
Convert Hexadecimal To String Online
Probably won't do it, but it might be worth trying if you can be bothered. I can't.
Anyway, I doubt it's machine code, but it might be a Hex representation of text. On the other hand, that might be too obvious. They're more like to be looking for people that can regognize patterns than machine code.
Join Date: Jul 2007
Location: Germany
Posts: 1
Likes: 0
Received 0 Likes
on
0 Posts
Well, that pissed on my bonfire! Its a programme in Javascript.
http://www.canyoucrackit.co.uk/15b43...d525e5d0b20.js
http://www.canyoucrackit.co.uk/15b43...d525e5d0b20.js
Join Date: Aug 2005
Location: Tennessee - Smoky Mountains
Age: 55
Posts: 1,602
Likes: 0
Received 1 Like
on
1 Post
Well it's a bizarre twist of fate that some other algorithm comes up with x86 executable code as its cipher text. Well done, that man.
Either that, or it is indeed machine code that when executed reveals something else to be solved.
Either that, or it is indeed machine code that when executed reveals something else to be solved.
Either that, or it is indeed machine code that when executed reveals something else to be solved.
Join Date: Jul 2007
Location: Germany
Posts: 1
Likes: 0
Received 0 Likes
on
0 Posts
If you know what you are doing, you need to read the header file from the actual "cyber.png" image. The saved image file contains the data. Looks like they are being a little cheeky, they are obviously looking for people who can look for data in hidden areas!
Its similar to the technique described here: How to hide files in JPEG pictures
The bit you are after is
"QkJCQjIAAACR2PFtcCA6q2eaC8SR+8dmD/zNzLQC+td3tFQ4qx8O447TDeuZw5P+0SsbEcYR.78jKLw=="
Its in base(64).
Its similar to the technique described here: How to hide files in JPEG pictures
The bit you are after is
"QkJCQjIAAACR2PFtcCA6q2eaC8SR+8dmD/zNzLQC+td3tFQ4qx8O447TDeuZw5P+0SsbEcYR.78jKLw=="
Its in base(64).
Last edited by VinRouge; 1st Dec 2011 at 19:36.
Cracked it! Quite easy really...
Once you are through it, the next screen shows the job on offer...
CYBER SECURITY SPECIALIST
RefCYBER/SEC/SPEC/11 PHASE 2RegionSouth WestLocationCheltenhamSalary£25,446 (GC10) £31,152 (GC9) DisciplineCyber GradeGC10/GC9 Closing date for applications is 12 December 2011
VACANCY DESCRIPTION
Cyber Security Specialist - GC10
Senior Cyber Security Specialist - GC9
GCHQ is at the forefront of the nation's cyber security strategy and is dedicated to ensuring our government can operate in cyber space with confidence. We are committed to staying ahead of the swift pace demanded by the evolving digital world.
In a game where our adversaries operate with no rules and unknown boundary lines, you will be exploring the possibilities and inventing the seemingly impossible. We need pioneers that can push the technical boundaries and cope with the unknown. Our work involves a journey to the very depths of operating systems, complex networks and IT security fundamentals.
Once you are through it, the next screen shows the job on offer...
CYBER SECURITY SPECIALIST
RefCYBER/SEC/SPEC/11 PHASE 2RegionSouth WestLocationCheltenhamSalary£25,446 (GC10) £31,152 (GC9) DisciplineCyber GradeGC10/GC9 Closing date for applications is 12 December 2011
VACANCY DESCRIPTION
Cyber Security Specialist - GC10
Senior Cyber Security Specialist - GC9
GCHQ is at the forefront of the nation's cyber security strategy and is dedicated to ensuring our government can operate in cyber space with confidence. We are committed to staying ahead of the swift pace demanded by the evolving digital world.
In a game where our adversaries operate with no rules and unknown boundary lines, you will be exploring the possibilities and inventing the seemingly impossible. We need pioneers that can push the technical boundaries and cope with the unknown. Our work involves a journey to the very depths of operating systems, complex networks and IT security fundamentals.
Join Date: Apr 2008
Location: The Whyte House
Age: 95
Posts: 1,966
Likes: 0
Received 0 Likes
on
0 Posts