Can you crack it gchq




















After analysis, it is clear that this machine code implements the RC4 decryption algorithm, and is able to decrypt a block of data that is hidden inside the PNG file, in a comment tag. Once decrypted, this data reveals the location of stage 2 of the challenge. Solved by. To solve this stage an implementation of a simple virtual processor is required. Some notes on the architecture are provided along with a block of data that can be analysed.

Solving this stage will reveal the final stage of the challenge. An executable file can be downloaded from the location revealed in stage 2. One example could be that the alphabet corresponds to a series of numbers that progress in intervals of two. Join thought-provoking conversations, follow other Independent readers and see their replies. Want to bookmark your favourite articles and stories to read or reference later? Start your Independent Premium subscription today.

Already subscribed? Log in. Forgotten your password? Want an ad-free experience? View offers.



0コメント

  • 1000 / 1000