Challenge: Saving A Fellow Spy
You will take on a cryptography challenge in this challenge by decrypting intercepted encrypted messages. Malicious attackers use cryptography to their advantage for attacks and remaining undetected. The goal is to show how attackers can effortlessly embed data within messages to hide their activity.
Already have an account? Sign In »
Module 1: Decrypt
Blue Team Analyst POV: Cryptography
In this challenge, you have intercepted an encrypted message but have yet to learn what encryption technique. Your task is to decipher the message to uncover its secrets.
To solve this challenge, you will need to use your knowledge of cryptography and problem-solving skills. You may need to try different approaches and techniques to determine the key and decrypt the message.
Who is this for:
Early career to mid practitioners. This challenge may be difficult for individuals new to cybersecurity, but the difficulty rating on this challenge is relatively low. We encourage using any internet resources and community/colleague assistance in completing the challenge.
Are write-ups permitted?
Yes, write-ups are permitted; please do not post answers directly. All write-ups should include a link to Cybrary and the Cybrary Course.
What resources are available to help solve this challenge?:
Online search, community, colleagues, or fellow practitioners.
Security Researcher - Incident Response
Complete this entire course to earn a Challenge: Saving A Fellow Spy Certificate of Completion