Free

Challenge: A Message Within A Message

In this challenge, you will take on a cryptography challenge by decrypting intercepted encrypted messages. Malicious attackers use cryptography to their advantage for attacks and remaining undetected. The goal is to show how attackers can effortlessly embed data within messages to hide their activity.
1
0
M
Time
beginner
difficulty
1
ceu/cpe

Course Content

Course Description

Blue Team Analyst POV: Cryptography

> In this challenge, you have intercepted an encrypted message but do not have the key. You have been told that the key is a single English word, but you need to know what the word is. Your task is to decipher the message and find the key.

> To solve this challenge, you will need to use your knowledge of cryptography and problem-solving skills. You may need to try different approaches and techniques to determine the key and decrypt the message. Once you have found the key, you can decrypt and reveal the hidden message.

![CySeeker Peculiar](//images.ctfassets.net/kvf8rpi09wgk/qbEzmd4efRzpA1lBEW8vZ/9fb4bc97f855861107cfa48daf666920/CySeeker_Peculiar.png)

Who is this for:

> Early career to mid practitioners. This challenge may be difficult for individuals new to cybersecurity, but the difficulty rating on this challenge is relatively low. We encourage using any internet resources and community/colleague assistance in completing the challenge.

Are write-ups permitted?

>Yes, write-ups are permitted; please do not post answers directly. All write-ups should include a link to Cybrary and the Cybrary Course.

What resources are available to help solve this challenge?:

> Online search, community, colleagues, or fellow practitioners.

This course is part of a Career Path:
No items found.

Instructed by

Master Instructor
Marc Balingit

Marc has led, managed, and performed global incident response investigations focused on large-scale data breaches, system compromises, data exfiltration, ransomware, and malware outbreaks. He has worn many hats throughout his Incident Response career, including proactive and reactive services. Outside Blue Teaming, Marc is passionate about Vulnerability Research and Malware Analysis. He is a Technical SME at Cybrary, focusing on Threat Actors and Blue Teaming for course content.

Provider
Cybrary Logo
Certification Body
Certificate of Completion

Complete this entire course to earn a Challenge: A Message Within A Message Certificate of Completion