Monday, March 28, 2016

Insomnia dan Cybersecurity

Secara literatur mungkin tidak ada kaitannya antara insomnia dan cybersecurity, tapi secara habit biasanya yang concern dengan hal cybersecurity itu rata-rata termasuk kategori Night Owl alias tukang ngalong. Intro nya sampai disini aja biar tidak melebar gak jelas kemana-mana XD

cek email bisa dikatakan sebagai ritual menyambut weekday untuk me-review agenda apa saja yang akan dilakukan esok hari, terlebih setelah melewati long weekend yang kadang menyebabkan lupa akan rutinitas. Nah disini awal ceritanya, ada satu email yang ternyata ke-skip tepat pada hari terakhir (minggu lalu) saat sebelum menjelang liburan hehe

isi email nya simple aja koq, hanya berisi url
http://www.bbc.com/news/technology-34312697

meski email nya sudah agak lama, berhubung kemarin malam (minggu malam) sudah agak larut, jadi direncanakan untuk membaca artikel besok harinya. Lampu kamar mulai dimatikan, dan 30 menit berlalu ... entah kenapa mata yang tadinya terkantuk-kantuk malah sulit dipejamkan. Bingung tak ada lagi aktivitas yang hendak dilakukan, rasa penasaran mulai muncul untuk lanjut membaca artikel pada tautan BBC tadi.

Setelah membuka laman artikelnya, rasa penasaran semakin menjadi setelah membaca judul yang sepertinya cukup menantang "Do you have the brains for cybersecurity?", setelah dilanjut membaca sepertinya memang menarik, yang tadinya iseng-iseng tak berhadiah, sampai akhirnya puyeng sendiri cari cara ter-simple untuk memecahkan puzzle tersebut.

Latihan mengarangnya udahan dulu, so langsung aja bahas games nya ya ^_^

Challenge One

ah... look like this is the simplest one, even the key is provided to decipher the message, we just need to substitute between character on the table below

our objectives are, first to decipher the questions, and then give an answer for each, while there are multiple choices, so let's get it done

Q1: Where was the center of CODEBREAKING during WW2
A1: Bletchley, the clue and answer was mentioned on top of the article

Q2: The man who designed the machine that CRACKED the ENIGMA CODE was...
A2: Turing, while Lorenz was the name of encipher machine, Turing was the man who build ULTRA, the machine that used to crack ENIGMA, anyone who loves history of WW2 should know it haha

Q3: The fundamental BUILDING block of ELECTRONIC devices is the...
A3: Transistor, trust me I'm graduate in electrical (telecommunication) engineering >.<
I tell you, in the past before the modern era of electronic, scientist made kinds of device using so many transistor block, while now thousand of transistor are transformed to be a micro chip

Challenge Two

we are provided sequence of numbers, now see to the hint, "once deciphered the string will reveal the name of a famous maths code that uses numbers"

to ensuring I do a little googling with phrase of "math number sequences" and I got a name Fibonacci

like challenge one this puzzle still simple, so here is the basic rule
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25

after deciphered by substituting letters to number, and yep we got this
58114130228184162041324
FIBONACCISEQUENCE

Challenge Three

refer to the clue and story like describes in the article, so I google "Caesar Cipher" directly, and got this http://www.counton.org/explorer/codebreaking/caesar-cipher.php

the algorithm is simple, it use shifting technique, in this puzzle an alphabet is placed 3 step forward, so when we try to decrypt we got this

BTW I think this is a tricky and legendary question, so that I know

Q: Where does Caesar kept his armies?
A: Up his sleevies haha

Challenge Four

we have this image, now we need to translate it so we can read clearly
Symbol-based code

by googling to search some reference of coding and ciphering, I got this http://article http://listverse.com/2012/03/13/10-codes-and-ciphers, from that I then know the type of Monoalphabetic Substitution, the key is on picture below
Pigpen

so by deciphering this puzzle we know the story that
IN THE 18TH CENTURY, FREEMASONS USED PIGPEN CIPHERS TO KEEP THEIR PRIVATE RECORDS.

Challenge Five

although I was so confused with Chemistry lesson while at High School, I still remember the name of chemical element on the Periodic Table, so this is the strong clue that show in the article for this puzzle

we have a question that enciphered into numbers, to solve the puzzle is by to answer this question
81, 1, 68, 59, 68, 86, 53, 76, 105, 53, 24, 22, 89, 5, 57, 68, 77, 50, 89, 81, 85, 4, 113, 71, 95, 86, 47, 44, 45, 33, 11, 64, 99, 12, 63, 10, 73, 8, 87, 52, 67, 68, 24, 72, 63, 25, 77, 6, 13, 3, 68, 57, 63, 101, 99, 60, 43, 14, 76, 88, 64, 47, 7, 53, 50, 99, 66, 76, 60, 22, 1, 99, 5, 47, 62, 53, 106, 8, 9, 81, 2, 68, 53, 75, 89, 52, 8, 25, 77, 27, 28, 113, 42, 4, 63, 75, 34, 63, 71, 63, 27, 52, 88, 76, 11, 17, 8, 11, 26, 77, 32, 113, 45, 13, 52, 77, 76, 11, 14, 13, 11, 66, 44, 63, 6, 115, 44, 37, 77, 7, 31, 6, 67, 63, 42, 77, 17, 13, 57, 84, 45, 8, 15, 63, 86, 43, 77, 68, 62, 74, 68, 23, 63, 92, 14, 68, 66, 53, 22, 52, 8, 24, 44, 68, 13, 81, 63, 18, 17, 53, 46, 72, 68, 44, 83, 39, 92, 62, 77, 28, 31, 52, 67, 63, 53, 28, 77, 43, 53, 13, 3, 3, 68, 65, 43, 63, 45, 34, 8, 26, 73, 67, 63, 68, 3, 63, 42, 68, 60, 65, 21, 4, 92, 73, 52, 74, 8, 57, 68, 65, 43, 63, 44, 38, 20, 13, 10, 52, 5, 63, 92, 50, 68, 66, 74, 67, 13, 81, 33, 75, 68, 81, 80, 63, 70?

OK, to be a hacker, we don't need to be a geek programmer, hacker is similar to entrepreneur, they will find easiest way to solve the problem, so here I tell you

refer to http://www.ptable.com, each number is represent a name of chemical element on the periodic table, we just need the initial and take the first letter, for example in periodic table 3 is Lithium (Li), so we take L to represent the number 3. Now open the excel program and make list of element number from 1 to 118, then follow this rule


I'm sure you smart enough to understand what I mean, see the function bar XD XD

now we have the question deciphered as below
THE  PERIODIC TABLE IS A TABULAR ARRANGEMENT OF THE CHEMICAL ELEMENTS ORGANIZED ON THE BASIS OF THEIR ATOMIC NUMBERS ELECTRON CONFIGURATIONS AND RECURRING CHEMICAL PROPERTIES WE'VE USED IT TO CREATE A CIPHER BY USING THE INITIAL LETTERS OF THE ELEMENTS BUT TWO LETTERS CAN'T BE USED WHAT ARE THEY?

by that question we understand, and the answer is...

they are J and Q

^ ^ v

Challenge Six

Challenge Six images

we have three puzzles on this part, like written on the article "when each one is completed it will reveal a quote from a well-known work of literature, whose author loved intellectual games of all kinds. Can you find all three?"

and we have this clue "Alice fell down a rabbit hole and left clues so Bob could find her..."

before we play, somehow I google by the image above and got this https://cybersecuritychallenge.org.uk/wp-content/uploads/2015/12/2015-Christmas-Cipher.pdf so we don't need to write the code manually.

Puzzle Number One

by looking the code, it's like sequence of Hexadecimal, I know because it encoded so usual, 2 digit number and or 2 digit number and alphabet one of A/B/C/D/E/F and no more hehe

first, decode hex number to plain text by using this tool
http://string-functions.com/hex-string.aspx

and we have this sentence

"Jr'er nyy? znq urer.? V'z znq. ?Lbh'er znq?." "Ubj qb? lbh xabj ?V'z znq?" ?fnvq Nyvpr?. "Lbh zhf?g or," fnv?q gur Png,? "be lbh j?bhyqa'g un?ir pbzr ur?er.

according to the clue, this should be an English quotes, the text above have an easy pattern so I thought it was rotated, somehow googling "rotator cipher" I found this article http://www.cryptool-online.org/index.php?option=com_content&view=article&id=48&Itemid=95&lang=en conceptually this is the Caesar Cipher and use 13 step forward shifting technique, so it named ROT13 Cipher, while A shifted to be ciphered as N.

go back to http://www.counton.org/explorer/codebreaking/caesar-cipher.php
and follow this rule to make ROT13
 

now we have deciphered readable sentence as above

Puzzle Number Two

I familiar with that picture, but what aaarrrrgghhh, still figuring out the key

Puzzle Number Three

It would be a Chess Cipher or else kind, I need to learn deeply and do research first

bookmarked
https://en.wikipedia.org/wiki/Grille_(cryptography)
http://www.cs.virginia.edu/~evans/cs588-fall2001/projects/reports/team2.pdf

and I was so sleepy to continue last night, hufh

note this is about Alice

~~~

NAH demikian cerita yang kepotong gegara keburu ngantuk berat, dan akhirnya bisa terlelap pulas kemarin malam menjelang pagi

dan tampaknya sekarang udah agak remang-remang juga setelah nulis sekian banyak zzZZ

Anyway, now I have great literature for reading, yeay! yeay!

Alice's Adventures in Wonderland

see ya ...

Tuesday, February 23, 2016

Indosat Loyalty Promo Paket Internet Gratis Tanpa Potong Pulsa

Sedang malas internetan gegara iklan ads.indosatooredoo.com yang suka muncul gak jelas, ditambah kantuk yang makin menjadi, disuasana hening tetiba hp berbunyi sedikit mengagetkan, taunya ada pesan WA yang ngabarin ada paket internet gratis Indosat.

Penasaran, seketika itu juga iseng memainkan jari jemari mengetik layar hp untuk memastikan paket promo indosat tanpa potong pulsa itu memang benar-benar nyata, gini ceritanya ...

Pastikan non aktifkan dulu paket yang sudah terdaftar, caranya kirim UNREG ke 363

Abis itu kirim deh tuh kode promo ini QB200K2 ke 363

dan hasil akhirnya ...

cek STATUS kirim ke 558
atau mau pamer kuota promo ketik USAGE terus kirim ke 558
update deh di sosmed

promo gratis kuota internet bulanan indosat tanpa potong pulsa ternyata berhasil, denger-denger sih promonya cuma 2 bulan, jadi pas bulan ke 3 nanti tuh daftar paket biasa lagi aja, lumayan sih itung-itung ngirit ganti sisa kuota pas akhir bulan :p, demikian sekilas info