Forum Profile







Recent posts (View all)
Re: Challenge

 On July 11, 2017, 9:51 a.m.

[HTML_REMOVED] .thumbs up

Re: Challenge

 On Jan. 8, 2017, 12:56 p.m.


the scripts are still running and as far as I can see, the server still bleeds correctly. :)

I restarted it (and the scripts) anyhow to make sure, we…

Re: Notification of new challenges

 On Sept. 9, 2014, 4:45 p.m.

Why not simply create a topic here in the general section, where a short notice is posted whenever a new challgene is online. This does not have to be anything…

Re: Challenge

 On Sept. 3, 2014, 3:45 p.m.

Please see my response to part 2, as it applies here too.

Re: Challenge

 On Sept. 3, 2014, 3:42 p.m.

All three parts require exploiting the heartbleed bug. In this part, you need some data from the server which you did not need for part 1 or 2. Of course, you …

Re: Challenge

 On Sept. 3, 2014, 3:38 p.m.

As mentioned on the last page of the challenge-pdf, this challenge is not a cryptographic one but a "hacking" one (nevertheless, the bug was in the implementat…

Re: Challenge

 On June 23, 2014, 4:54 p.m.

An additional note for this challenge: The enigma model used in this part of the challenge uses one rotor of a different model (see hints from part 1 and 2). T…

Re: Challenge

 On June 23, 2014, 12:51 p.m.

For implementing the CrypTool 2.0-Simulator we used [1] as the base reference. In general, it is very hard to find good documentation about some of the details…

Re: Challenge Maulwurfsjagd (Teil 1/3)

 On Sept. 26, 2013, 7:13 p.m.

Der kryptologische Ansatz ist folgender (beschrieben zB. in H.F. Gaines, Cryptanalysis, ab S37):

Man geht davon aus, dass ein (langes) Wort bekannt ist, zB.…

Re: S/MIME (Secure/Multipurpose Internet Mail Extensions)

 On Sept. 16, 2013, 2:58 a.m.


the private key is generated locally in your browser. Only the public key is sent to the CA, which in turn signs it.

However, you are correct with o…

Re: Challenge Maulwurfsjagd (Teil 1/3)

 On July 1, 2013, 2:07 p.m.

Dazu gibt prinzipell zwei Ansätze:

1.) Sie "probieren" es mit allen möglichen Schlüssellängen (d.h. brute-force der Schlüssellänge). Wie Sie schon sagten, k…

Re: Challenge Maulwurfsjagd (Teil 1/3)

 On June 24, 2013, 6:10 p.m.

Ihr Ansatz wäre richtig, wenn die verwendete Schlüssellänge genau 5x8 = 40 wäre. In diesem Fall würden sie sogenannte mehrfache Anagramme suchen.

Leider is…

Re: Challenge "Cascading Encryption — Part 2/3"

 On March 28, 2013, 12:02 p.m.

Dear jomandi,

yes and yes. Both messages have been encrypted with the same ADFGVX-key (substitution and transposition).


Re: Challenge "Cascading Encryption - Part 1/3"

 On March 27, 2013, 1:36 p.m.

Dear George,

yes, I know [HTML_REMOVED] - I helped in designing the definitions for the levels [HTML_REMOVED] :). However, challenges which can be solved al…

Re: Challenge "Cascading Encryption - Part 1/3"

 On March 27, 2013, 12:44 a.m.

Hi there,

first, lets distinguish between the three parts of this challenge and the two messages in the first part. Therefore, we are talking right now abou…

Currently 20 guests and 0 members are online.
Powered by the CrypTool project
Contact | Privacy | Imprint
© 2009-2023 MysteryTwister team