Welcome to ManTech Cyber Challenges - Algorithms!
You will find below a message and associated algorithm to challenge your understanding of algorithms, how they operate, and commonly encountered uses within cyber security.
Challenge Algorithm 1
Please send the unique flag and solution to '[email protected]' with subject 'Cyber Challenge Solution Algo1'. Be sure to include how you solved the challenge with a technical explanation, description of how you used any resources/tools, and any pitfalls encountered. A properly decoded message will contain a unique flag.
9f 95 98 9e c4 c0 9d 9f 9a 9f 9c ca 9a d4 9f cf 9a c8 d4 cd c9 cd cc d4 9b 98 9a
cd d4 ca ca c0 ce ce c9 ca c9 9f cf c8 9a
0f 10 01 c7 44 24 08 a4 ae 9c 6f 66 49 0f 7e c1 66 0f 73 d8 08 66 48 0f 7e c2 4c
03 ca 49 3b d1 74 25 48 8d 44 24 08 41 b8 04 00 00 00 0f 1f 00 0f b6 08 48 8d 40
01 30 0a 49 83 e8 01 75 f1 48 ff c2 49 3b d1 75 db c3 cc cc cc cc cc cc cc cc
Challenge Algorithm 2
Please send the unique flag and solution to '[email protected]' with subject 'Cyber Challenge Solution Algo2'. Be sure to include how you solved the challenge with a technical explanation, description of how you used any resources/tools, and any pitfalls encountered. A properly decoded message will contain a unique flag.
51 5b 56 50 0a 52 07 52 53 52 55 0e 02 1a 02 54 0e 0f 1a 03 04 03 06 1a 0f 52
06 04 1a 01 05 03 04 0f 06 07 54 52 0e 0f 01
48 83 ec 18 48 8b 41 08 4c 8b 09 4c 03 c8 c7 04 24 4d 40 6e 54 c7 44 24 04 33
63 68 43 c7 44 24 08 79 62 33 72 c6 44 24 0c 21 49 3b c1 74 28 90 48 8d 14 24
41 b8 0d 00 00 00 66 0f 1f 44 00 00 0f b6 0a 48 8d 52 01 30 08 49 83 e8 01 75
f1 48 ff c0 49 3b c1 75 d9 48 83 c4 18 c3 cc cc cc cc