Skip to content

geocachingCTF - Cybersecurity made Fun! geocachingCTF - Cybersecurity made Fun! TB #2: Cryptography

Trackable Options
Found this item? Log in.
Printable information sheet to attach to geocachingCTF - Cybersecurity made Fun! TB #2: Cryptography Print Info Sheet
Owner:
CyberQueenMeg Send Message to Owner Message this owner
Released:
Thursday, July 1, 2021
Origin:
Arizona, United States
Recently Spotted:
In Bell Rock Hop - Paddlin' Cactus View V2

This is not collectible.

Use TBA1720 to reference this item.

First time logging a Trackable? Click here.

Current Goal

Travel the world educating geocachers about cybersecurity best practices!

About This Item

This is the second trackable in a series of 50 cybersecurity trackables. Please read the information below about basic cybersecurity and if you are in Phoenix, find the geocachingCTF geocaches (more information at https://geocachingctf.github.io/index.html)!

 

What is Cybersecurity?

Cybersecurity is the practice of securing computer systems from unwanted access, intrusion, modification, or spying. All people who use a computer need to have a basic understanding of best practices online and what cybersecurity professionals do so that they can best protect themselves. Cybersecurity is a broad discipline, including encryption/decryption (cryptography), ethical hacking, penetration testing, system configuration, incident response, forensics, and mitigation, antivirus development, malware removal/remediation, and so much more. This series of caches will educate you about different aspects of the important field of cybersecurity.

 

What should I do to protect myself online?

  • Create strong passwords that are 10 characters or longer and contain at least three uppercase letters, three lowercase letters, three numbers, and three special characters, such as #, $, or &. Change them every 30 to 90 days.
  • Enable the firewall on your devices.
  • Ensure that you see 'https' in a website URL when you are making a purchase or disclosing personally identifiable information (PII).
  • Do not click on any links in your email that come from an unfamilliar source. They could be phishing.

 

What are the different kinds of attacks that happen?

Malware is code that damages a system, steals information, or does other bad things when it is run. Everything below is a type of malware.

  • Phishing Attack: A malicious file or link is sent in an email; when it is run it damages the computer. Other types of malware in the phishing family include spear-phishing (targeting a user based on their affiliation with a group), vishing (on a phone call), and smishing (through text messaging/SMS)
  • Ransomware: A hacker takes control of a computer system, encrypts and locks the data, and demands a payment, or ransom, in order to restore the system.
  • Trojan Horse: A program that a user installs that has a function they want, but also has malware in its code.
  • Time/Logic Bomb: Malware that lies dormant until a certain point of criteria has been reached, such as a certain day or time or a user logging into the system.
  • Worm: Malware that can spread to other machines without human help.
  • Zombies: Computers under the control of an attacker. If your computer is attacked by a zombie, someone else has complete control of your computer.
  • Botnet: A collection of zombies that are used to bring down websites with a Distributed Denial of Service (DDOS) attack or to send phishing/spam emails.
  • Spyware: Malware that collects information about the users on a system.
  • Keylogger: Spyware that records all of a user's keystrokes to obtain passwords and PII.

 

What is Cryptography and how does it relate to Cybersecurity?

Cryptography is the practice of encrypting messages or numerical codes so that they can not be read without decrypting them. Here are some common types of cryptographic codes:

  • Caesar cipher: What the Geocaching website uses to encrypt hints. Messages encrypted with a Caesar cipher are shifted forward a set amount of letters. To decrypt the message, one has to shift back the amount of letters the message was encrypted. EX: 'Geocaching' with a shift of 5 would read 'Ljthfhmnl'. Please use this resource to help you.
  • Binary to Decimal/Decimal to Binary: Converting to and from the Base 10 number system (decimal) to the Base 2 number system (binary). In Base 2, the only two digits used are 0 and 1, and each time a multiple of 2 is reached, a new place is added. This resource will help you convert from Decimal to Binary and vice versa.
  • Hex to Decimal/Decimal to Hex: Converting to and from the Base 10 number system (decimal) to the Base 16 number system (hex). In Base 16, the digits of 0-9 and A, B, C, D, E, and F are used. Each time a multiple of 16 is reached, a new place is added. This resource will help you convert from Decimal to Hex and vice versa.
  • Binary to ASCII: ASCII is a way of representing letters through the binary number system. To convert back and forth, please use this resource.

 

This information came from my own knowledge as well as information from CyberPatriot, the world's largest youth cybersecurity competition.

Gallery Images related to geocachingCTF - Cybersecurity made Fun! TB #2: Cryptography

    View All 2 Gallery Images

    Tracking History (789.2mi) View Map

    Dropped Off 11/27/2021 MyTBoyz placed it in Bell Rock Hop - Paddlin' Cactus View V2 Arizona - 306.62 miles  Visit Log

    I left this trackable here for the next fello hiker that comes here.

    Retrieve It from a Cache 11/26/2021 MyTBoyz retrieved it from Keys to the Kitchen Arizona   Visit Log

    This trackable comes with us back to California to find a new cache

    Dropped Off 11/18/2021 USAdotRun placed it in Keys to the Kitchen Arizona - 89.05 miles  Visit Log

    Dropping off

    Retrieve It from a Cache 11/12/2021 USAdotRun retrieved it from Deputies, bring in those travel bugs Arizona   Visit Log

    Picking up

    Dropped Off 11/1/2021 _rogue_ placed it in Deputies, bring in those travel bugs Arizona - 334.56 miles  Visit Log

    What a great place to move on to hope you get moving fast

    Retrieve It from a Cache 11/1/2021 _rogue_ retrieved it from Arizona Travel Bug Hotel Arizona   Visit Log

    Moving this one along

    Dropped Off 8/6/2021 CyberQueenMeg placed it in Arizona Travel Bug Hotel Arizona - 327.7 miles  Visit Log
    Visited 8/1/2021 CyberQueenMeg took it to TMH - Trig is Fun New Mexico - 9.88 miles  Visit Log

    Visited CyberQueenMeg’s 200th cache! Pic of the cache with the Albuquerque LDS temple visible from cache put as a clue in the puzzle.

    • Visited CyberQueenMeg’s 200th cache! Pic of the cache with the Albuquerque LDS temple visible from cache put as a clue in the puzzle. Log image uploaded from Geocaching® app
    Visited 7/30/2021 CyberQueenMeg took it to Truckin’ Turquoise Trail Travelbug New Mexico - 1.77 miles  Visit Log
    Visited 7/30/2021 CyberQueenMeg took it to #4 Another Fine Jeep Trail You Got Me Into New Mexico - .26 miles  Visit Log
    data on this page is cached for 3 mins