Crack It If You Can – A Challenge

Cryptography has been developed and are developing a lot, there are so many new techniques and algorithm available to encrypt a secret message. So I have decided to share something about the secret communication, let suppose you have received an image and the image might be contain some message that is hidden. It seems to be intelligence agency movies now suppose the same scenario I will give you the image and you need to find out the secret message. It is a little challenge that will surely improve your knowledge and skills.


  • See the image below
  • Try to crack or hack it than find the secret message
  • If you will find it than simply share it via comment box (if your answer will right than I will hold it so that other will try it)
  • If you will fail then you need not to worry because at the end of the challenge I will show the method to find the message
  • Do not forget to share it with your friends so that they will try

This image is a map but it has something strange, Crack it if you can.
Other announcement that I want to discuss it here is that list of the backtrack 5 tutorial has been updated all of these tutorial is also applicable on backtrack 5 r1 so there is no need to make a separate tutorial section for backtrack 5 r1.
List of the metasploit tutorial has also updated and one more thing do not use contact us form for your questions, ask your question via comment box so that I will reply as soon as possible. If you use contact us for your question than it means you are not going to receive your answer.
It is a very simple challenge and the method of cracking is very simple and I believe that most of you will do this.
Additional comments will be appreciated.

Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Top 5 Techniques Hackers Use to hack Social Media Accounts

These days, Social Media have become a significant need in our everyday life. It encourages us to associate and connect with anyone over the...

5 Top Programming Languages for Hacking

We live in the 21st century, which is very fast-changing. This is a century of competition for information and computing resources. Every year the...

OSINT Tutorial to Track An Aircraft And Flight Information In Real-Time

No doubt Internet is said to be the world's largest repository of data and information. It contains an enormous amount of data related to...

Preventing SQL Injection in PHP Applications

SQL injection is one of the most common cybersecurity threats and as the name suggests, it is a form of injection attack. Injection attacks, on...