Maintain your old Siemens Hipath system

Crack The Code - Thats A Direct Challenge

I Challenge You To Crack The Code
-------------------------------------
I had quite an interesting experience recently. I was hired by a company to perform a vulnerability assessment and penetration test on their network. During the initial meeting, one of the key technical staff presented me with a challenge; He handed over the NTLM hash of the domain Administrator account and challenged me to decipher it. He explained that the complexity and length of the password would prevent me from deciphering it during the time allotted for the project. He was actually quite confident in my impending failure.

In most cases, this individual would have been right on the mark. On the other hand, I'm not sure he expected to challenge someone who has close associates with discretionary time on some of the most powerful computers in the world.

6 Hours, 2 Servers, 64GB of Memory, and 32 Processors Later and.....
------------------------------------
It took just under six hours to decipher the password. Of course, my 'associates' were using a program of my choice on servers with 32 processors and 64GB of RAM a piece. It's nice to have friends with access like this. Especially in my line of work. Needless to say, my client was shocked when I called him the next day and gave him the password.

Let's Have Some Fun: A Challenge For You
----------------------------------------------
(In order for you to do this, you need to go to: http://www.defendingthenet.com/NewsLetters/ CrackTheCode-ThatsADirectChallenge.htm)

Shortly after this experience, I started thinking about writing an article about it. Then I thought to myself, why write just an article? Why not come up with a challenge for our readers?

Hidden in this article is information that will ultimately provide you with a phrase that has been encrypted. You will need to know a few pieces of general information such as, where to find the hash in this article, how to extract the hash from the article, what the password is that will reveal the hash, and what type of hash is being used! Still with me on this? You will need to do all this before you can start cracking the encrypted phrase.

First, you need to find the hashed phrase located in this article. I'll give you a hint; I recently wrote an article about hiding messages in files. This article can be found on the Defending The Net Newsletter Archive. It is also in the www.CastleCops.com archive. Oh, and once you find where the hash is you will need a password to extract it. This one I am going to give away. The password to extract the hash is 'letmein' (without the ' ' of course).

Then, you will need a tool that can easily handle deciphering of the hash once you extract it from this article. There are quite a few out there that will do the job, however, I highly recommend using pnva naq noyr i2.69, a publicly available security tool that no self respecting security engineer should be without. You will also need to know the type of hashing algorithm that was used. I decided to use zrffntr qvtrfg svir because it is relatively well-known. (Try saying that 13 times real fast!)

Conclusion
----------------
The first person to successfully unravel this riddle and e-mail me at riddle@paralogic.net with the deciphered phrase, along with a detailed description of how they accomplished the task, will receive a 512MB, USB2.0 Jump Drive. As soon as we receive this information we will post it on the main page of www.defendingthenet.com.

About The Author
----------------
Darren Miller is an Information Security Consultant with over sixteen years experience. He has written many technology & security articles, some of which have been published in nationally circulated magazines & periodicals. If you would like to contact Darren you can e-mail him at Darren.Miller@ParaLogic.Net

In The News:

Undersea 'blasts' recorded at same time Russia-Germany gas pipelines damaged
Tue, 27 Sep 2022 09:39:00 +0100
The Nord Stream pipeline network, part of which supplies Germany with gas from Russia, has been damaged in three places, its operator has said.

Qatar 'conscripting civilians and summoning diplomats from abroad' to do World Cup security
Tue, 27 Sep 2022 11:31:00 +0100
Qatar has called up hundreds of civilians - and summoned back diplomats from overseas - for mandatory military service to operate security checkpoints at World Cup stadiums.

Eleven children among 17 killed in Russia school shooting as wounded to be taken to Moscow
Tue, 27 Sep 2022 13:15:00 +0100
More than a dozen children wounded in a school shooting in central Russia are being transferred to Moscow for further treatment.

Shakira to face trial over alleged £13m tax fraud
Tue, 27 Sep 2022 12:16:00 +0100
Shakira is set to go on trial for tax fraud after a Spanish judge approved proceedings against the pop megastar.

Lawyer facing charges in case linked to Kenya's president found dead
Tue, 27 Sep 2022 11:31:00 +0100
A lawyer facing charges at the International Criminal Court (ICC) in a previous case linked to Kenya's recently elected president has been found dead.



tikatoshop.it

Erfahrungen mit Pallhuber Wein
Agen Bola SBOBET Terpercaya

Travel in comfort and at your leisure with CT Airlink Limousine & Car Service for top quality private transportation and exceptional customer service. We operate Sedans, SUVs & Vans for CT Car Services to covering all Connecticut airports including Car Service from CT to Newark Airport , Mohegan Casino Uncasville CT, Foxwoods Casino Mashantucket CT, Manhattan Cruise Terminal NYC, Brooklyn Cruise Terminal NYC and Bayonne Cruise Terminal NJ. CT Airlink hire licensed and friendly chauffeurs who have in-depth knowledge of the Areas.

Desktop Security Software Risks - Part 1

This is the second in a series of articles highlighting... Read More

Why you Must Secure your Digital Product and Thank You Web Page

A couple of years back, I paid my dues the... Read More

3 Pervasive Phishing Scams

Scams involving email continue to plague consumers across America, indeed... Read More

Corporate Security for Your Home Business

The words Corporate Security may conjure up images of a... Read More

Spyware Symptoms

Spyware symptoms happen when your computer gets bogged down with... Read More

Password Security and Safety

There is nothing more important that password security in world... Read More

Is My PC Vulnerable on the Internet?

No longer are viruses the only threat on the internet.... Read More

A Basic Introduction To Spyware

Spyware is the most troublesome software to appear on the... Read More

What Can Be Done About Spyware And Adware

Having a good Spyware eliminator on your computer is vital... Read More

Crack The Code - Thats A Direct Challenge

I Challenge You To Crack The Code ------------------------------------- I had... Read More

Phishing, Fraudulent, and Malicious Websites

Whether we like it or not, we are all living... Read More

If You Sell Anything Online Your ePockets Are Being Picked

You and I are a lot alike. We are both... Read More

All About Computer Viruses

Your computer is as slow as molasses. Your mouse freezes... Read More

Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

1. Geek Superhero http://www.deprice.com/geeksuperhero.htmGeek Superhero watches your computer for changes,... Read More

Dont Get Hacked - A Guide to Protecting Your Business from Thieves

You've seen it in the news - 40 million credit... Read More

5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a... Read More

Another Fine Mess!

I'm in the Anti-Spyware business, and I'm doing a lot... Read More

Protecting Your Home Both Inside and Out

If you are a parent, you have probably wondered at... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More

Free Spyware Removal - Its Not As Easy As It Sounds

Nobody wants to pay to remove spyware. At the very... Read More

Protecting Your Children On The Internet

If you are a parent, as am I, I think... Read More

Everything You Need To Know About Spyware and Malware

You are at your computer, checking out software on EBay.... Read More

Passwords or Pass Phrase? Protecting your Intellectual Property

Much has been said on the theory of password protection... Read More