1. There is no substitute for a good cipher! Decode the following message: Jrypbzr, gunaxf sbe cynlvat!


  2. What place are they talking about? qrcode.png


  3. cG9saWNlb2ZmaWNlcg==


  4. 01100101 01111001 01100101 00100000 01110000 01100001 01110100 01100011 01101000 01100101 01110011 00100000 01100001 01110010 01100101 00100000 01100011 01101111 01101111 01101100


  5. -... .. - - . -. / -... -.-- / .- / .-- .- .-.. -.- . .-.


  6. 010110010011001101001010011101100110001100110011010011100110100101100010001100110110001100111101


  7. Identify which encryption standards are block cipher designs and which are stream ciphers. Check those that are stream ciphers.
    1.   Triple-DES
    2.   RC4
    3.   AES
  8. In what year was the asymmetric cryptographic algorithm RSA first published?


  9. Who designed the MD5 hash?


  10. Whirlpool creates a hash of how many bits?


  11. The hackers are using various encryption methods to mask their passwords.
    Can you decode this? 66 69 67 75 72 65 31 38 73 65 63 72 65 74 65 6e 64


  12. 045 163 145 143 062 071 071 067 160 154 141 171 145 162 044 045


  13. ODluZXZlcnRlbGw0OQ==


  14. What is the plaintext version of these ciphers? rpyvcfr


  15. rszqrozmfkdcazmmdq


  16. mfwwozkpc


  17. What is the sha-1 hash of: snowflake


  18. What is the sha256 hash of: bananna


  19. What is the md5 hash of: tractorpull


  20. What is the crc32 hash of: evergreen


  21. What is the whirlpool hash of: Newdryer117


  22. We’ve been tracking some thieves for weeks. We recently found this page ripped out of a book with the following secret coding attached to it.book page.jpg

    What have the thieves stolen?

    3:12:10 / 3:3:10 / 3:5:7 / 2:4:5 / 2:1:9 / 1:8:3 / 2:2:10 / 3:14:8 / 3:5:4


  23. Where am I planning to meet my buddies? crypto.png


  24. What time are we meeting? crypto.png


  25. look at this ngix log. How many requests were logged? Click here


  26. How many unique status codes were returned by the server?


  27. How large was the largest response body in bytes?


  28. How many requests were made by Firefox?


  29. How many attempts were made to exploit CVE-2020-8515?


  30. Now take a look at this access log. How many different IP addresses reached the server? Click here


  31. How many requests yielded a 200 status?


  32. How many requests yielded a 400 status?


  33. What IP address rang at the doorbell?


  34. What version of the Googlebot visited the website?


  35. Which IP address attempted to exploit the shellshock vulnerability?


  36. What is the most common HTTP method used?


  37. What was the second most common http method?