Search found 5 matches
- Sat Jul 20, 2013 6:16 pm
- Forum: Challenges Solved
- Topic: Black Box
- Replies: 13
- Views: 1591
I guess not, therefore the reverse calculation is only about twice as fast as the normal brute force approach. Well, what you have to solve is the linear congruence equation: x*22233442 == 186968300 (mod 4294967296). This can be done with knowledge of elementary number theory (extended euclidean al...
- Sat Jul 20, 2013 4:29 pm
- Forum: Challenges Solved
- Topic: Patience
- Replies: 10
- Views: 2061
- Tue Jul 16, 2013 5:04 pm
- Forum: Challenges
- Topic: Inscrutable
- Replies: 11
- Views: 25653
- Tue Jul 16, 2013 4:50 pm
- Forum: Challenges Solved
- Topic: Forced Entry
- Replies: 17
- Views: 3038
Could somebody please tell me how the original SQL-statement looked like? I solved it with this string: http://www.adum.com/fortknox/index.php?name=admi'%20UNION%20SELECT%20password%20FROM%20user%20WHERE%20'1'='1 admi' UNION SELECT password FROM user WHERE '1'='1 I got to know that the table is cal...
- Tue Jun 18, 2013 5:30 pm
- Forum: Challenges Solved
- Topic: CipherQuest D
- Replies: 15
- Views: 1617
Hi, it has been a long time since last post but maybe some people are still around... This one was definitely harder than the previous ones because all the frequency analysis was fucked up by missing common digrams. The sQ and sQP were incredibly high and I have waited a long time before assigning t...