L.A. Noire: How to solve the Cipher Puzzle [Nicholson Electroplating]
Hey guys, in this video I'll show how to sove the Cipher puzzle in the Nicholson Electroplating Case at the blast site. It took about 5 minutes to figure out what to ...
From this vid - L.A Noire Cipher Puzzle. What you need to do: OUTER DIAL =
H INNER DIAL = K OUTER DIAL = K OUTER DIAL = S OUTER DIAL = B OUTER DIAL =
O OUTER DIAL = J OUTER DIAL = L OUTER DIAL = K OUTER DIAL = Q OUTER DIAL =
X OUTER DIAL = S OUTER DIAL = B Thumbs up so other people can easily see
this. All thanks to that guys link, Germaniac7.
lemme make it easy for everyone.. The top ring should have H and the
bottom, K. Then just select the top ring and gradually press A shifting
through each letter. its slow but works. :P
DEF CON 23 - Ryan Castellucci - Cracking CryptoCurrency Brainwallets
Imagine a bank that, by design, made everyone's password hashes and balances public. No two-factor authentication, no backsies on transfers. Welcome to ...
Well done Ryan! I'm not sure if that guy at the end MEANT to be a jerk but,
it came off as a jerk by trying to call out the speaker on his math... Or
at least I thought so. I think you did well, man!
+Ryan Castellucci Makes sense, well explained great talk man. Well done for not taking those coins your a better man than most. Keep stretching the boundaries of brute forcing, you have my deepest respect for keeping us aware of these limitations.
+Mitchell Bumgarner The issue seems to be that I didn't make the assumptions that estimate was based on very clear (because time). I talked to him later on IRC, and it seems that he didn't realize that the numbers I gave were inclusive of the dictionary, and that attackers competing with each other would not want to make tradeoffs that reduced storage requirements at the expense of lookup speed.
I think this is the guy that spoke in Dan's talk, I enjoyed both, work on
passwords is extremely interesting to me since I've been cracking them for
a while now, one of my bugbears is that people rate the password strength
in bits by making assumptions about how they were picked and how they will
be guessed such as using brute force, when in reality crackers optimise to
find patterns in human behaviour. There's 7bn people on the planet, if you
think you're being random, you aren't.
+Frosty I've been chatting with some of the people on the appropriate IRC channels (and I think I've spoken to bitweasil in the past). A nice reminder how much I still don't know, but I'm hoping some of their skill for low level optimization rubs off on me.
+Ryan Castellucci Thanks for the reply Ryan, was that last year? Alas despite wanting to come to defcon more than anything I wasn't able to afford it, the DEFCONConference youtube channel recently released the start of this years vids, one of which was Dan Kaminskys talk. Either way I appreciate your work, you should get in touch with bitweasil who has done work on GPU accelerated rainbow tables work (cryptohaze) because together that could be a really powerfull block-chain cracker system. He did US95CharLen8 rainbow tables for NTLM which parse in about 2 hours, absolutely epic password cracking power, do the math on the hash/sec on that, it's insane. Password safety is in large part down to how a potential cracker will attempt your password and in what order, will he do passphrase first, dictionary, dictionary+mask, etc. It's a complex topic, I often get chewed out for going against the XKCD method of things, too many fanboys sticking religiously to old ideas unfortunately, as hackers we should know better.
+Frosty Yes, I spoke in Dan's talk last year. I tried to touch on there being no known method (and I suspect it is impossible) to algorithmicly evaluate the strength of a human chosen password of passphrase accurately. Best you can do is estimate the upper bound. Useful to reject obviously awful passwords on web sites, useless for high security applications where the attacker is presumed to be able to run an offline attack.
+Joe M I guess this wasn't as clear as I'd hoped. I am not a lawyer, but the reasoning here is that the fifth amendment would prevent you from having to reveal your passphrase which would prevent seizure regardless of reasonableness. I question how well this would work in practice since if they could prove that you had a brainwallet corresponding to a specific address, your production of the passphrase would not constitute "testimony" and thus not be protected by the fifth amendment. They could conceivably throw you in jail indefinitely for contempt if you refused in this case. I would be very entertained to see the opinions of some actual lawyers on the matter.tl;dr: people think the fifth amendment protects you from having to reveal the passphrase, and without the passphrase the seizure isn't possible regardless of "reasonableness", but the reality is probably way more complicated than that.
How to Use the Random Substitution Cipher
This video explains how to use my random substitution cipher online. This tool is at //www.brianveitch.com/mathcamp/cryptography/
+crackuh snackuh Who told you that you had the right to tell a man what to do with his life? Maybe he enjoys it huh? Ever thought about that? Gee.. free country... aint been rude or anything , just think before you type.
• Write the credit code down on a piece of paper.• Write the word "Shifter" down beneath it several times, each character beneath its corresponding character of the credit code, until you can't fit any more in.• Find a Vigenere square. Search for one on Google images and print it off.• Starting with the first character, find where the letter "S" is in the first column, then go along its row until you find the letter that is above it on your piece of paper, then for "H", for "I" and so on until you finish all the times you wrote "Shifter" beneath it...• You will eventually have deciphered the message. You're welcome.
Hey I have a theory, that maybe all of the guys that fall in love with
Mabel are secretly people who are trying to spy on the pines family and
trying to collet all of the 3 books, and gain all power, EXEPT for the
gnomes and mermando
As technology increases, so do the methods of encryption and decryption we have at our disposal. World War II saw wide use of various codes from substitution ...
+wouterMC5000 That's precisely what I explained in my previous comment. Not sure how I could have made it more clear. The enigma machine does both the encryption and the decryption. So if you know how the enigma machine works, like you say, then you already have the answer to your question.For a more detailed understanding, you need to look at wiring diagrams for the enigma.
+armpitpuncher I know how the thing works. I know how a message is encrypted. (Meaning: you have a message and the enigma gives you the coded message.) But how can you transform the coded message back into normal language?
+wouterMC5000 The wires in the rotors are set up in such a way that for any given rotor position, there are 13 matched letter pairs such that typing one of the letters in the pair produces the other letter, and vice versa.So, for example, if you type the letter A, and the letter B is produced, then you move the rotors back to the original position, and type B, it will produce A.So you apply that principle across an entire message. You type a message, you will get the encrypted message. Then, if you set the rotors back to the position they were in when you started, and type in the encrypted message, you will get your original message back.
Its not a easy thing to understand ,the enigma is actually involved in the origins of the computer , the first computer was build to decrypt it , the first computer maker/inventor was alan turing , the imitation game is a movie based on the true story of alan turing making the computer , you should really check it out.
True but that was the first Enigma code their were many each getting progressively more complex. The first cracked by the Poles was a static civilian code that was relatively easy to crack unfortunately the Nazi's militarized the machine just weeks after the invasion of Poland & changed it on daily bases rendering the polish crack & machine useless. Britain was blind again until it captured one of the new machines some months later to see how it worked. Enigma was a 3 rotor low level code system used by the Army. The German high command used the Lorenz machine a far more complex 12 Rotor system & to break this code the British invented 'Colossus' the world's first electronic programmable digital computer.
No You not right, betwen 1928-1939 during the many changes in coding maded by Germans it was 100% of polish job .In june 1939 we gave all detail about enigma to britons and french , inculding copy of enigma machine and builded encoding machine, Poles did like 90% of encoding at all. When french recived all this i said , they were upset, why so late, briton were like " we dont care and not intrested", later when Poland was defeated by the nazis, Britain took 100% of success an responsibilty of breaking enigma code which was a obvious lie.. Sorry for my english :)
No. It was first broken by the polish in 1932 in the early stages. But the Germans were adjusting the coding everyday in the build up to war. When the polish solved it there were not 159 million million million different codings. The polish asked the British to crack the code. In fairness to Poland though they discovered the enigma machine so without them the British would never have solved it.