Crack the U.S. Cyber Command's Secret Code!!

Page 2 - Seeking answers? Join the Tom's Guide community: where nearly two million members share solutions and discuss the latest tech.
Status
Not open for further replies.
[citation][nom]joebob2000[/nom]...the hash itself is in no way reversable to the text unless you have a million million years of supercomputer power and a pretty good idea of what the text said to begin with (since you will get a trillion hash collisions before you get to the real text)[/citation]

Or you could wait 10-20 years and buy a mid-range comupter from a big box store that could crack it in a couple minutes.
 
Looks like trnddwn33, garpizzle and extremepcs were all on the same same page due to a certain topic on a certain website...
 
hell for cracking US cybercommand code; instead of a gold star tom's should offer someone guaranteed amnesty, armed guards and the best damn jew lawyers(no offense) that money can buy!
 
If you group the numbers like this 9ec4:c1:29 49a4:f3:14 74:fe:99:5 8ce2:b2:2a convert them to decimal, use the appropriate mod 180 or mod 90 you get these two sets of longitudes and latitudes 54:13:41 132:3:20 and 70:33:5 66:58:42 Assuming North America, you'll find one near the town of Masset and the other the town of Iqualuit Taking the anagram of Masset & Iqualuit you'll get the secret code:

"IT - Salami Quest"
 
[citation][nom]joebob2000[/nom]Close, but it's actually an irreversible hash for the text you quoted; the hash itself is in no way reversable to the text unless you have a million million years of supercomputer power and a pretty good idea of what the text said to begin with (since you will get a trillion hash collisions before you get to the real text)[/citation]
Actually, hashes aren't reversible, period (though what you said is essentially correct). The whole point of a hash is to represent a set of data of undefined length as a discrete, finite, and reasonably unique code that allows for authentication/identification/verification of the original data set. This process is one-way only and, in most cases, reduces the original data set to a code (the hash) which lacks the information to resolve back to the original.
 
Maybe it's a code that gets to some top secret military info, stating that we had Osama Bin Laden's head all along. All of the videos are just actors potraying him.
 
USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.

http://www.md5decrypter.com/
 
[citation][nom]JamesSneed[/nom]joebob2000, its not irreversable, go here and copy/paste the code in: http://www.dshield.org/tools/reversehash.htmlAll you got to do is call the US Cyber Command help desk and they will tell you the numbers on there are a MD5 hash of there mission statment. Anyhow the correct answer was an MD5 hash of there mission statment.[/citation]
James, that tool is only a calculator when it comes to GENERATING hashes. For reverse resolving them, "It uses a database of a couple million pre-compiled hash values." So basically it just looks the hash up in a database and matches the known original input.

If you don't believe me, try this... go to another website that has an MD5 generator (or download one) and put some random text into it. Generate the MD5 hash and then drop it into the reverse hash tool. After a few seconds you will get the message that a match was not found.
 
[citation][nom]JamesSneed[/nom]joebob2000, its not irreversable, go here and copy/paste the code in: http://www.dshield.org/tools/reversehash.html [/citation]

Uhm, actually, that doesn't crack it, it just compares the code to the database and if it's in the database, it translates it, else, fail.

You can't crack that with any computer, nethet today nor in 10-20 years.
 
63026a762373160aedd16194f091b614

The code in the cyber command logo IS MD5 hash just like the code above. Decrypt it for a fun message from me. It can be encrypted and decrypted without much fanfare. Hash is hash is hash.
 
[citation][nom]garpizzle[/nom]63026a762373160aedd16194f091b614The code in the cyber command logo IS MD5 hash just like the code above. Decrypt it for a fun message from me. It can be encrypted and decrypted without much fanfare. Hash is hash is hash.[/citation]

How do you expect us to do that?
 
Congratulation on cracking the Code... Tom, tell them what they have won!

Tom (in my best game show announcer’s voice): You have won Extraordinary Rendition! You will be whisk away in the middle of the night to an unknown location! Forget about scuba diving... We have water boarding! and who would want to sleep, when you can experience Sleep Deprivation Treatment, we have Metallica playing 24 hours a day, seven days a week as loud as possible! And don’t forget our gourmet meals delivered strait to your cell! It’s the ultimate vacation, no job, no worries, no lawyers, No Friends, and we won’t even tell your family where you are!
 
[citation][nom]garpizzle[/nom]63026a762373160aedd16194f091b614The code in the cyber command logo IS MD5 hash just like the code above. Decrypt it for a fun message from me. It can be encrypted and decrypted without much fanfare. Hash is hash is hash.[/citation]

Garpizzle rocks...He also loves Cornbeef Hash with gravy while he encrypts hash.
 
Status
Not open for further replies.