With any stego, things can be interpreted in many ways, and ALL of them look like passwords. Should we be expecting an english word for the "Answer" or will it be random?
Ok thank you for answering. I just wanted to make sure that was part of the challenge, and not just some sort of bug or mistake. I will not figure that part out and put the pieces together. Thanks.
Um, well I think I have some information: Image text: PGN**** Filename: ANJ**** Owner: Ala****/J***** I think I might have all the pieces, but not enough to put it together. Can someone give me a hint on what I'm supposed to "do" ? The Filename kinda alludes to the owner info... Forget it ...
I feel like no one is reading my posts carefully. The included blowfish.php does NOT include a function for decrypting: Fatal error: Call to undefined method Blowfish::blowfish_decrypt() In order to solve this did you guys have to write your own decrypt function? I feel like that is not ...
Like this? $text = $blowfish->blowfish_decrypt($cipher); //$text == 'This is plain text' echo $text; You get: Fatal error: Call to undefined method Blowfish::blowfish_decrypt() The included code doesn't have a function for decrypting. But that is what I'm asking, but I don't think thi...
Um, it looks like this challenge may have changed. Perhaps in the past the challenge was to encrypt something, but now it is to decrypt it? I can solve the suduku, get the sha1 hash, now I just need to put the encrypted text and the sha1 has I have together and decrypt, but the provided php code is ...
Just so I'm not totally wasting my time, should I be trying a dictionary type brute force? Or should I be iterating through possible characters of the $strPasswordMD5?
Is this a multi-layer tiff? Gimp can't seem to read them, and tiffsplit only sees one layer. I don't really feel like pirating Photoshop, is there a linux tool that I can use?
Ok, well I've got the raw binary (or all permutations of it), and there is the two pieces, one some text that everyone here can confirm is NOT the answer, and then the piece of garbage. (Apparently related to t**/*p) Well it looks like there are 16 bits of info in the garbage, maybe some extra zero'...