This commit is contained in:
stephensottosanti
2021-03-07 22:24:40 -06:00
parent 4269f42796
commit 565bb1efc2
5 changed files with 32 additions and 13 deletions

Binary file not shown.

After

Width:  |  Height:  |  Size: 414 KiB

View File

@@ -1,13 +0,0 @@
# Code-Breaking and Decoding
Having the ability to interpret and understand data even if it is presented in a different or unknown format is extremely important to conducting cyber security examinations and to the general understanding of cyber security. A coded message is simply a message that has been changed in some way so as to hide its meaning from prying eyes. <br>
There are many different ways to write the same information. Below is a Lookup Table that shows decimal, hex, octal, and html encodings for characters. There are other ways to encode messages, such as binary or Base 64, but these will give a good idea of how encoding works. <br>
The message “Let the games begin!” could be encoded as follows: <br>
Dec: 76 101 116 32 116 104 101 32 103 97 109 101 115 32 98 101 103 105 110 33 <br>
Hx: 4C 65 74 20 74 68 65 20 67 61 6D 65 73 20 62 65 67 69 6E 21 <br>
Oct: 114 145 164 040 164 150 145 040 147 141 155 145 163 040 142 145 147 151 156 041 <br>
Html: &#76 &#101 &#116 &#32 &#116 &#104 &#101 &#32 &#103 &#97 &#109 &#101 &#115 &#32 &#98 &#101 &#103 &#105 &#110 &#33 <br>
![Ascii Talbe](https://github.com/crimsonDefense/CyberSecurityClub/blob/main/00_Archive/images/asciiTable.png?raw=true)

View File

@@ -0,0 +1,22 @@
# Code-Breaking and Decoding
Having the ability to interpret and understand data even if it is presented in a different or unknown format is extremely important to conducting cyber security examinations and to the general understanding of cyber security. A coded message is simply a message that has been changed in some way so as to hide its meaning from prying eyes. <br>
There are many different ways to write the same information. Below is a Lookup Table that shows decimal, hex, octal, and html encodings for characters. There are other ways to encode messages, such as binary or Base 64, but these will give a good idea of how encoding works. <br>
The message “Let the games begin!” could be encoded as follows: <br>
Dec: 76 101 116 32 116 104 101 32 103 97 109 101 115 32 98 101 103 105 110 33 <br>
Hx: 4C 65 74 20 74 68 65 20 67 61 6D 65 73 20 62 65 67 69 6E 21 <br>
Oct: 114 145 164 040 164 150 145 040 147 141 155 145 163 040 142 145 147 151 156 041 <br>
Html: &#76 &#101 &#116 &#32 &#116 &#104 &#101 &#32 &#103 &#97 &#109 &#101 &#115 &#32 &#98 &#101 &#103 &#105 &#110 &#33 <br>
![Ascii Talbe](https://github.com/crimsonDefense/CyberSecurityClub/blob/main/00_Archive/images/asciiTable.png?raw=true) <br>
Being able to recognize different encoding schemes can be an asset when trying to find hidden information. However, encoding isnt the most secure way to code a message. If a person recognizes the encoding scheme, all they have to do is go to the lookup table to decode it. <br>
Encryption is different from encoding as encoded messages do not require secret information to understand or interpret. Whereas, encryption involves altering the content of the message and must be decrypted using a secret key to reverse the process. Encryption is a more secure way to code a message. Encryption takes a key known by the encoder and uses that key to change the message. Then, only the people that know the key will be able to decrypt the message. The simplest form of encryption is a Caesar Cypher. For the example above, a Caesar Cypher shift +1 would shift each letter in the message up by one character. So, Let the games begin! would become Mfu uif hbnft cfhjo! More information on encryption: <br>
[How to Make Your Data Safe Using Cryptography](https://www.guru99.com/how-to-make-your-data-safe-using-cryptography.html) <br>
[Cryptography - KhanAcademy](https://www.khanacademy.org/computing/computer-science/cryptography) <br>

View File

@@ -0,0 +1,9 @@
# File Analysis
File analysis and understanding is one aspect of the larger field of Digital Forensics. Digital Forensics encompasses the investigation of data found on digital devices and involves preserving, identifying, extracting, documenting and interpreting this data. <br>
One of the more common activities in digital forensics is the recovery of deleted files. Though a user may have “deleted” or “moved a file to the trash bin” those files are not always deleted. A very nice set of intuitive tools for use in digital forensics is The Sleuth Kit tool set (http://www.sleuthkit.org/index.php). <br>
Below is a screenshot of the output of the Sleuth Kit file listing tool (fls) which shows two files that have been “deleted” by the user but are still recoverable. The ability to recover and save what was previously thought to be deleted files can be very valuable in an investigation. <br>
![File Analysis](https://github.com/crimsonDefense/CyberSecurityClub/blob/main/00_Archive/images/fileanalysis.png?raw=true) <br>

View File

@@ -36,6 +36,7 @@ a comprehensive list of the types of challenges that will be seen during the com
The following provides additional information and links for some of the challenge types
to assist the students in preparing for UACTF 2021.<br>
[Code Breaking and Decoding](/Skills/Code_Breaking)<br>
[Reverse Engineering](/Skills/Reverse_Engineering)<br>
Again, the above is not an all-inclusive list of topics for UACTF, but it is a good starting