Hak4Kidz had a beta challenge recently, advertising their upcoming fundraiser/holiday challenge. If you happen to have the time during Christmas, and shortly after, you may want to take a look at their challenge. It's a good cause. Here is their about page: http://www.hak4kidz.com/about.html Here are the details about the contest: http://www.hak4kidz.com/contests/.
The Hak4Kidz beta challenge was fun. You have to have a keybase account to do it, so one has to learn the basics of using a keybase account. Once you have an account, set it up according to the directions on keybase, and followed Hak4Kidz, you get a file in your public keybase folder giving directions about where to get the file for the challenge. The file was "READMETOO.txt". It directs you to a dropbox download link. The dropbox account has a file called, "h4k_unwrapthecode.wav".
The file had low frequency beeps and high frequency beeps. I remembering hearing dial-up modems when I was a bit younger, so I figured that the low beeps were 0's and the high beeps were 1's. I took note of them. After taking note of them, I took off the first four digits. (I remember that the modem was saying when a connection was established using those, and it wasn't supposed to be with the data.) This was the binary: (If you take off the first four digits, it should show the ascii phrase.)
1010010010000110000101110000011100000111100100100000010010000110111101101100011010010110010001100001011110010111001100100001001000010010000001011001011011110111010100100000011001100110111101110101011011100110010000100000011101000110100001100101001000000110001001100101011101000110000100100000011001100110110001100001011001110010000100101
Then I used a binary to ascii converter. The message was "Happy holidays!! You found the beta flag!"
No comments:
Post a Comment