• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

GCHQ Code Breaking Challenge Solved Through Googling

December 5, 2011

Views: 13,611

This is quite an amusing story, I’m sure many of you have read about the ‘hacking challenge’ set up by GCHQ and that they are looking to hire hackers cyber-security specialists through non-traditional channels.

The thing that tickled me was, well there were two things actually..one that the challenge site was coded in ASP and the second was that you could avoid the whole cracking thing and find the solution page via Google by using the site: operand (O HAI).

Ok and another…the .css files aren’t absolute and don’t work outside of the home directory. I’m not surprised they are only paying £25,446 if this is the kind of talent they are hiring.

The GCHQ-set code-breaking puzzle was solved over the weekend.

The signals intelligence agency last week set a puzzle at canyoucrackit.co.uk in its attempt to unearth potential recruits beyond its traditional graduate programme. Late last week it emerged that the successful completion page for the puzzle was available by a simple Google search.

Many people have since cracked the code properly including Dr Gareth Owen, a computer scientist and senior lecturer at the University of Greenwich in England. Owen has posted a full video explanation of how to solve the three-part puzzle here.

Would-be code-breakers were presented with a 16×10 grid of paired hexadecimal numbers. The first stage involves recognising executable code as well as unpicking some steganography.

Stage two involves developing a virtual machine to execute code.

The challenge itself isn’t too bad, but it’s rather narrow in it’s scope – if you’re a x86 assembly kind of dude – you’ll be fine. If that aint your bag, you might struggle a bit with this – honestly it doesn’t fill me with hope for the future of the talent pool in GCHQ.

All negativity aside I personally applaud them for trying to do something different and trying to hire through different channels, it may well turn up some talent they wouldn’t normally be able to hire.

The final stage involves constructing a file with ‘gchqcyberwinAAAABBBBCCCC’ where A, B, C are the codes from earlier in the challenge. This code, when run, generates a web address which has the keyword (the web address is wrong if you put the wrong a,b,c in).

“The last stage contains a deliberate security hole, which GCHQ emailed me to say was deliberate to make solving the problem easier – but it turns out I took a short cut instead and bypassed this bit,” Owen explained.

Reaching the successful completion page was a “rather disappointing end to quite a lot of work,” as he puts it.

GCHQ is offering would/be applicants who crack the code a starting salary of just £25k, very low for a skilled job, as the Daily Telegraph notes.

Owen summed up the feelings of many when he told El Reg: “Why are we paying world-class cyber security experts what we pay passport-stampers at the border-control-agency?”

Anyway if you want to go directly to the job application, it’s here:

CYBER SECURITY SPECIALIST

Closing date for applications is 12 December 2011, so you’ve still got a little bit of time if you’re itching to earn £25K a year.

Source: The Register

Related Posts:

  • An Introduction To Web Application Security Systems
  • Initial Access Brokers (IAB) in 2025 - From Dark Web…
  • Cybersecurity Workforce Trends in 2025 - Skills Gap,…
  • Autoswagger - Automated discovery and testing of…
  • HTTrack - Website Downloader Copier & Site Ripper Download
  • Systemic Ransomware Events in 2025 - How Jaguar Land…
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Legal Issues, Privacy



Reader Interactions

Comments

  1. -jack spicer- says

    December 6, 2011 at 10:40 am

    man…thats a low paygrade….not easily digetable…u’ve gotta say something has to be worth it…

  2. Yussi says

    December 6, 2011 at 3:04 pm

    That was disappointing…
    Having spent 2 hours trying to make sense of the number grid, running Caesar cypher on it, dumping it as strings gave the only readable text as something like x=AAAA, Cx=BBBB, trying to do complex matrix operations etc. the thing is, i started by looking at it as an assembler bytecode, but it didn’t look right as the first instruction skips 6 lines, doesn’t really look like a legit program. the only clue about it being assembler was a mov 0xDEADBEEF instruction. Not that i would work at GCHQ, but i would love working at solving puzzles. Oh well, I guess I’m not one of those 25k Britain’s finest!

  3. cyber1 says

    December 7, 2011 at 4:41 pm

    The “soyoudidit” link was not found on google before the solution was posted on a public blog. They have disallow in their robots.txt so GCHQ did not do anything wrong. Google was just indexing a private blog.

  4. Charles Meaden says

    December 9, 2011 at 12:54 pm

    As one of the guys who uncovered the simple Google hack last week on our blog

    http://www.alwaysbetesting.co.uk/seo/how-to-crack-the-gchq-code-breaking-competition-using-google/

    I can confirm that last Thursday night at 9pm when we wrote the blog post there was no robots.txt file in place.

    I’d suggest that this was added later once they were suitably embarrassed

    • cyber1 says

      December 9, 2011 at 7:05 pm

      Actually the robots.txt does not matter if the there is no link to the hidden page from the public site. Googles spiders do not use bruteforce to find hidden links :) it’s only crawling the links that it finds thru the public site. You’re wrong in this case, the “soyoudidit” was not available on Google before is was posted on another page.

      By the way, using Google Analytics on a page is absolutely not recommended if you care about privacy or anonymity.

  5. opsec says

    December 10, 2011 at 8:44 pm

    I love google, try this one on for size, then reflect that if its so god damned confidential why the hell do they hire idiots who put it up where it can get indexed by a robot.

    Search: “NOT FOR DISTRIBUTION” classified inurl:”armedservices”

    Worthwhile reading material about USCYBERCOM “Sorry what was the Budget Quote?” OMFG a load of marines all armed with Windows XP it wont be vista because vista hasnt been out for 8 years which would be the length of time to be approved. OMG cyber warriors with Windows XP.. phear!

    • cyber1 says

      December 10, 2011 at 9:30 pm

      Those documents are not confidental, the hearings was even published on Youtube :)
      http://www.youtube.com/watch?v=7Js3I_d6VjI

      The documents was deliberately published. that’s why Google found them here:
      http://armedservices.house.gov/index.cfm/hearings-display?ContentRecord_id=79ce7b4c-f88b-40bf-9540-efdb3a2d26b2&ContentType_id=14f995b9-dfa5-407a-9d35-56cc7152a7ed&Group_id=64562e79-731a-4ac6-aab0-7bd8d1b7e890&MonthDisplay=3&YearDisplay=2011

      I’m surprised of how many people that thinks google is some kind of bruteforcing machine :) It’s not, is only indexing publicly posted documents & links, or links from the robots.txt file.

  6. opsec says

    December 11, 2011 at 11:02 am

    We all love the intelligence community it’s just a sad fact of life we’re still waiting to see any, intelligence that is.

    Graduate Level: We are looking for graduates with a minimum 2:1 degree in a STEM related subject (Science, Technology, Engineering and Mathematics), preferably with a significant IT component.

    Experienced: We are looking for people with specialist knowledge, professional qualifications and/or practical experience gained in a formal or informal setting.

    Yeah, because every hacker worth there salt has a Degree in Maths!

  7. opsec says

    December 11, 2011 at 11:40 am

    Alan Turing had a Maths Degree && a lot of good it did him working for the intelligence community, look him up and then read about how he died. He poisoned himself with Cyanide, not the intelligence community saw him as a liability and assassinated him.

  8. Bogwitch says

    December 15, 2011 at 12:50 am

    The puzzle itself was quite convoluted and required a knowledge of assembler rather than cryptography, not impossible and yes, a little disappointing.

    The 25k pay scale was no surprise to me, I have said for many years that civil/crown servants are underpaid and it explains quite clearly why CESG are haemorrhaging staff faster than they can recruit them, most of whom end up back at CESG as contractors on double their pay (but less pension) Don’t forget that although they are contractors, they are employed by companies that provide their services into CESG and charge considerably more, usually in the region of £850-£1000 per day. Still, at least the politicians can say they’ve reduced the civil servant count!

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Systemic Ransomware Events in 2025 - How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Views: 1,833

Jaguar Land Rover’s prolonged cyber outage in 2025 turned what would once have been a “single … ...More about Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

SmbCrawler - SMB Share Discovery and Secret-Hunting

SmbCrawler – SMB Share Discovery and Secret-Hunting

Views: 1,739

SmbCrawler is a credentialed SMB spider that takes domain credentials and a list of hosts, then … ...More about SmbCrawler – SMB Share Discovery and Secret-Hunting

Heisenberg Dependency Health Check - GitHub Action for Supply Chain Risk

Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Views: 1,119

Heisenberg Dependency Health Check is a GitHub Action that inspects only the new or modified … ...More about Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Dark Web Search Engines in 2025 - Enterprise Monitoring, APIs and IOC Hunting

Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

Views: 2,834

Dark web search engines have become essential for enterprise security teams that need early … ...More about Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

mcp-scan - Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Views: 1,040

mcp-scan is a security tool from Invariant Labs that can run as a static scanner or as a dynamic … ...More about mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Initial Access Brokers (IAB) in 2025 - From Dark Web Listings to Supply Chain Ransomware Events

Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Views: 922

Initial Access Brokers (IABs) have moved from niche forum actors to central wholesalers in the … ...More about Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (232)
  • Cryptography (85)
  • Dark Web (6)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (13)
  • Hacker Culture (10)
  • Hacking News (237)
  • Hacking Tools (709)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,424,593)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,174,078)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,504)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,310)
  • Password List Download Best Word List – Most Common Passwords (934,597)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,333)
  • Hack Tools/Exploits (674,282)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,367)

Search

Recent Posts

  • Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like November 26, 2025
  • SmbCrawler – SMB Share Discovery and Secret-Hunting November 24, 2025
  • Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk November 21, 2025
  • Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting November 19, 2025
  • mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers November 17, 2025
  • Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events November 12, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2026 Darknet All Rights Reserved · Privacy Policy