Find the Secret Message – Cracking Challenge

Information security is a very broad
filed of IT and it involve the activities of hacking, cracking,
penetration testing, computer forensic and many more. We have
discussed various aspect of information security via different
articles and tutorials and this time we are presenting a cracking
challenge which is some kind of a reverse engineering and computer forensic. The theory behind the cracking is to evaluate your
intelligence level, I mean how quick you can understand the problem
and how fast you can get the solution.

Table of Contents

The Story

The story is
very simple let suppose you are a penetration tester for an
organization which is responsible for the homeland security and your
team member has got three images which seems to be suspect, your job
is to evaluate these images whether they are just a image of they
contain contain some secret messages.


Your job is
to find out the image (s) which contain secret message and your job
is to find out the message which is hidden of-course. It might be
possible that all of them has some messages or it might be possible
that only one contain the message. The quick overview of the
challenge is :

  • Find out
    how many of these images contain the secret message
  • Find out
    what actually the message (s) is/are

The images




you will find it than simply share it via comment box (if your answer
will right than I will hold it so that other will try it), If you
will fail then you need not to worry because at the end of the
challenge I will show the method to find the message(s).

Do not forget
to share it with your friends so that they will try, share it via
your social media profiles and on different forums. Discuss the issue
with the relevant people. The result will announce right after three
weeks so you have enough time to do the job. Your questions will be entertain.

Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...