Categories: Other

HA! another company. Take a look at the below email. It's always funny when you receive an email like the one below.

"On April 4, we were informed by Epsilon, a company we use to send emails 
to our customers, that files containing the names and/or email addresses 
of some Crucial customers were accessed by unauthorized entry into their 
computer system.

We have been assured by Epsilon that the only information that may have 
been obtained was your name and/or email address. No other personally 
identifiable information that you have supplied to Crucial was at risk 
because such data is not contained in Epsilon's email system.

For your security, we encourage you to be aware of common email scams 
that ask for personal or sensitive information. We will not send you emails 
asking for your credit card number, social security number or other 
personally identifiable information. If ever asked for this information, you 
can be confident it is not from Crucial.

For your security, however, we wanted to call this matter to your attention. 
We ask that you remain alert to any unusual or suspicious emails and remain 
cautious when opening links or attachments from unknown third parties. Our 
service provider has reported this incident to the appropriate authorities.

We regret this has taken place and for any inconvenience this may have 
caused you. We take your privacy very seriously, and we will continue to 
work diligently to protect your personal information."
Lucky for me this was in my spam email address, but it serves as a great example of the tight security out there. I Wonder if a bank would ever email me something like this?

Posted by shazbot
Categories: Challenges

Congratulations to dbsynergy for solving the first SF2600 challenge! nodus and yotta completed the challenge second and third respectively.

To celebrate the completion of the site, a hacking challenge was posted in the Terminal section. The challenge involved reversing of the algorithm used to encrypt passwords of JS/UIX OS and recovering of the root password.

Below are several code snippets used to solve the challenge. Everyone found the encrypted password in jsuix_krnl.js and correctly reversed the algorithm:

//dbsynergy's Quick 'n Dirty Solution
var printable = new

var decrypted = '';
var currentTest = '';
for(var i=0; i < conf_rootpassskey.length; i+=2){
      for(var p=0; pprintable.length; p++){
              if(krnlCrypt(currentTest+printable[p]) ==
                      currentTest += printable[p];

This algorithm has a slightly longer runtime, because it iterates over entire alphabet. This can be optimized a bit more by decoding the string character by character as as done in the next example.

#nodus's Algorithm Decode Solution

import re
#from line 50 of jsuix_krnl.js
while '' in pairs:

#got this from the js console in chromium with
keys=[14, 122, 255, 33] 
for str_pair in pairs:


for i in numbers:
   number = (i-last)-keys[count%4]
   while number <1:
for i in numbers2:
print string

It took nodus a bit longer (15 minutes to be exact) to write a complete decoder. While the code looks a bit longer, it is actually more efficient (no nested loops and reverses the algorithm character by character).

iphelix's Masochist Calculator Solution
If you feel like torturing yourself a bit, you can
solve the puzzle manually with a piece of paper 
and a calculator ;-)

The algorithm went along something like this:

Hash = 73 5A BB 3D BD 9A FA 7F F2 DE 4C
Salt = 0e 7a ff 21

0x73 - 0x0e - 0 [+0x100]    = 'e'
0x5A - 0x7a - 73 [+0x100]  = 'm'
0xBB - 0xff - 5A [+0x100]   = 'b'
and so on...

Well I hope everyone enjoyed the challenge, I will cook up something more evil for the next one.

Feel free to design and submit your own challenges to the site.

Posted by iphelix