Find the Secret Message – Cracking Challenge

Information security is a very broad
filed of IT and it involve the activities of hacking, cracking,
penetration testing, computer forensic and many more. We have
discussed various aspect of information security via different
articles and tutorials and this time we are presenting a cracking
challenge which is some kind of a reverse engineering and computer forensic. The theory behind the cracking is to evaluate your
intelligence level, I mean how quick you can understand the problem
and how fast you can get the solution.

The Story

The story is
very simple let suppose you are a penetration tester for an
organization which is responsible for the homeland security and your
team member has got three images which seems to be suspect, your job
is to evaluate these images whether they are just a image of they
contain contain some secret messages.


Your job is
to find out the image (s) which contain secret message and your job
is to find out the message which is hidden of-course. It might be
possible that all of them has some messages or it might be possible
that only one contain the message. The quick overview of the
challenge is :

  • Find out
    how many of these images contain the secret message
  • Find out
    what actually the message (s) is/are

The images




you will find it than simply share it via comment box (if your answer
will right than I will hold it so that other will try it), If you
will fail then you need not to worry because at the end of the
challenge I will show the method to find the message(s).

Do not forget
to share it with your friends so that they will try, share it via
your social media profiles and on different forums. Discuss the issue
with the relevant people. The result will announce right after three
weeks so you have enough time to do the job. Your questions will be entertain.

Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Top 10 things to Do After Installing Kali Linux

Kali Linux is considered to be one of the best hacking distribution of this era, it is developed by Offensive Security to give an...

Become a spy in your own right with Xnspy Android spying app

Having become widely popular among parents and employers, spying apps have become quite the norm nowadays. Android spying apps have made it a lot...

e-Services Portals Potentially Expose Government Infrastructure to File-based Attacks

More and more users are embracing technology to perform their day-to-day activities. It’s not only private businesses that are forced to establish digital channels...

What is Nmap? How to use Nmap for Information Gathering

Nmap stands for Network Mapper, a powerful network scanning and host detection tool that is being used to perform reconnaissance in a very first...