A couple of weeks ago I saw this on my LinkedIn feed:

At first I was upset, because I had already purchased my CrikeyCon 2018 ticket. But alas, a challenge is a challenge.

It looks like we’ve got some MD5 hashes. You can usually tell an MD5 hash by the 32 character length comprised of hexadecimal (0-9, A-F).

MD5 is compromised, and there are plenty of online tools to crack it.

I normally use hashkiller’s MD5 decrypter. It’s quick and easy, and probably has the largest publicly available database of cracked hashes.

So let’s crack’em.

Copy and paste the four lines into the decrypter, type in the captcha, and submit.

Four numbers:

Whatever could these be? I spent longer than I’d like to admit trying to find a secret message. Did each number stand for a letter? Did they respond to ASCII codes?

Nope, it’s a plain old IP address:

Alrighty. Nothing to see here. Let’s just check the page source to be sure…

It’s got a comment telling Google, Yahoo, and Bing to go away. Maybe it’s something to do with robots.txt, which gives instructions to web-crawlers?

So they don’t want /supersecrethiddenfolder to be advertised. Let’s check it out.

So we’ve been assigned the user NormalBoringUser. Maybe this is stored in a cookie. I’m gonna use a Chrome plugin called EditThisCookie to see what’s up.

So there is a cookie. I’m gonna edit it to DroppyTheDropBear.

After a refresh, I get this.

Alrighty, let’s use netcat to connect to the port.


Not a bad little challenge. Anyways, I’m looking forward to CrikeyCon 2018. I’ve signed up for Bluetooth Hacking 101 the day before, so I’m very excited.