Skip to content

Latest commit

 

History

History
31 lines (17 loc) · 1.31 KB

ReadMe.md

File metadata and controls

31 lines (17 loc) · 1.31 KB

Welcome to Spooky Land

Challenges

  1. Hashing is used to verify if files are the same as other files. One major use of this is to verify if a file that has been downloaded from the internet had either been intentionally modified to include malicious content or to check if it was corrupted in transit. Your task is to verify which of the copies of Frankensteins are unaltered and which have been modified.

    • Hints

      • Frankenstein.txt is the orginal
      • Their are several options of hashes you can use to check the files. Why might some be better than others?git
  2. Your challenge if you choice to accept it is to recover the file hidden in WhatAtMystery.

    • Hints

      • You might want to look at different base encoding schemes
      • The command "file <filename>" is your best friend

Contributors

  1. Thomas atkins www.github.com/Nova38

Sources

  1. Thank you to Project Gutenberg their online copy of Frankenstein
    • This eBook is for the use of anyone anywhere at no cost and with almost no restrictions whatsoever. You may copy it, give it away or re-use it under the terms of the Project Gutenberg License included with this eBook or online at www.gutenberg.org
    • URL to frankenstein gutenberg.org/cache/epub/42324/pg42324.txt
  2. Photo from by Bekir Dönmez on Unsplash