Challenge #1
-
In Challenge #1, we can use the tools on the website dcode.fr to identify the algorithm used. When you copy and paste the cipher text into the dcode Cipher Identifier tool, it will show potential algorithms. If you click on the top one that is the one that seems most likely (the ROT cipher), the site will then open up a new page that is specifically for ROT decryption. Paste the cipher text into this new page and then click the 'Decrypt' button. The answer will appear on the left-hand side of the screen.
Challenge #2
-
In Challenge #2, we can use the tools on the website dcode.fr to identify the algorithm used. When you copy and paste the cipher text into the dcode Cipher Identifier tool, it will show potential algorithms. If you click on the top one that is the one that seems most likely (Morse code), the site will then open up a new page that is specifically for Morse code decryption. Paste the cipher text into this new page and then click the 'Translate Morse' button. The answer will appear on the left-hand side of the screen.
Challenge #3
-
In Challenge #3, you will first start by downloading the image of the dinosaur. Then, you can use the steghide application to extract the "SuperSecretFile.txt". The password is the name "t-rex".
Challenge #4
-
In Challenge #4, we will again use the tools on the website dcode.fr to identify the algorithm used. When you copy and paste the cipher text into the dcode Cipher Identifier tool, it will show potential algorithms. This time, it is not the stop tool on the list of possible algorithms. For this challenge, I was thinking of a certain favorite book, Cryptonomicon by Neal Stephenson. Since that book started during WWII, I selected the Enigma Machine algorithm.
Copy over the cipher text, and without changing any of the options, hit the "Decrypt/Encrypt" button. The correct answer, minus spacing, will appear on the left-hand side of the screen.
Challenge #5
-
The CIA triad is a foundational concept in information security, representing three core principles:
Confidentiality: Ensuring that sensitive information is accessible only to authorized individuals or entities.
Integrity: Safeguarding the accuracy and reliability of data by preventing unauthorized alterations.
Availability: Ensuring that information and resources are consistently accessible and usable when needed by authorized users.
Challenge #6
-
In Challenge #6, we will begin by downloading the image. From there, you can right-click the image and select the "Details" tab. Scroll down and you will find the altitude.
Challenge #7
-
Using the normal method of solving cryptograms, you can work through the puzzle manually. Or, using this website, you can copy the cipher over and have the website automatically solve it.
The correct answer is:
As cybersecurity leaders, we have to create our message of influence because security is a culture and you need the business to take place and be part of that security culture.
Britney Hommertzheim
Challenge #8
-
According to The Hitchhiker's Guide to the Galaxy, the answer is 42.
Challenge #9
-

Challenge #10
-

Challenge #11
-
I found this website, https://www.jenshansen.com/pages/online-english-to-elvish-engraving-translator, that converted English words and phrases into Elvish.
Challenge #12
-

Challenge #13
-

Challenge #14
-

Challenge #15
-
Copying the encoded text, you can paste into the web browser of your choice. One of the first results to appear is the website https://usefulwebtool.com/cryptonumerals. If you navigate to that site, you can then paste the text into the top text box and hit the "To normal text" button. The website will decrypt the text. The phrase is "At the end of the day, the goals are simple: safety and security" and can be attributed to Jodi Rell, a former politician.
Challenge #16
-
The answers are:
alarm, lapse
Challenge #17
-

Challenge #18
-

Challenge #19
-

Challenge #20
-
Using the website https://what3words.com/, enter the three-word trio "clues.grew.books". It will bring you to a location in Albuquerque, New Mexico.
ABQ BioPark Zoo, located in Albuquerque, New Mexico, is a facility of the Albuquerque Biological Park. Founded in 1927, the 64-acre (26 ha) zoo was originally known as the Rio Grande Zoo. Sections of the zoo include an Africa exhibit area, an Australia exhibit area, the "Cat Walk" and a herpetology area. An endangered species carousel was added in 2016. A narrow-gauge railroad connects the zoo to the other facilities of the Albuquerque Biological Park. Walking distance through the zoo is 2.27 miles (3.65 km).
Challenge #21
-
In Challenge #21, we can use the tools on the website dcode.fr to identify the algorithm used. When you copy and paste the cipher text into the dcode Cipher Identifier tool, it will show potential algorithms. If you click on the top one that is the one that seems most likely (the Pigpen cipher), the site will then open up a new page that is specifically for Pigpen decryption. Paste the cipher text into this new page and then click the 'Decrypt' button. The answer will appear on the left-hand side of the screen.
Challenge #22
-
There really isn't a solution, unless you count not wasting countless hours trying to beat it.
Challenge #23
-
B) Phishing attack
Explanation: A phishing attack is a type of cyber attack where attackers attempt to deceive individuals into revealing sensitive information by posing as a legitimate and trustworthy entity, such as a bank, email provider, or government agency. These attacks often involve fraudulent emails, text messages, or phone calls that prompt recipients to click on malicious links, download infected attachments, or enter their confidential information into fake websites.
Challenge #24
-
In Challenge #24, we can use the tools on the website dcode.fr to identify the algorithm used. When you copy and paste the cipher text into the dcode Cipher Identifier tool, it will show potential algorithms. If you click on the top one that is the one that seems most likely (the ROT47 cipher), the site will then open up a new page that is specifically for ROT47 decryption. Paste the cipher text into this new page and then click the 'Decrypt' button. The answer will appear on the left-hand side of the screen.