Welcome to the VOID Storage Hack Challenge! Your mission is to decode the hidden messages embedded in the visuals. Submit the correct SHA256 hash to earn a spot in the final hackathon!
There are 3 different challenges: Easy, Pro, and Doom modes. If you successfully decode the messages in Pro or Doom mode, you’ll be invited to our main hacking event.
We want everyone to have a chance to participate and understand the methodology. We recommend starting with the easy one to get a feel for the VOID system.
The VOID algorithm is a system. We're here to prove its reliability. What you're interacting with is version 0.0.0.1 — an entry-level model. If you manage to break through this level, you'll gain access to a much more advanced experience like no other.
To prove the strength of our system, we're giving you insights and metadata that are usually hidden in most hack events. This is your chance to reverse-engineer with full transparency.
VOID is a unique storage technique developed by Devdeed. It’s currently implemented in our Web3-based messaging product NOCBY, where its advanced version secures all user data.
Thank you for joining the event, the event is done and we are still alive.
If you would like to see the answer, just click the button below!
And don't forget to join our DC channel! 🚀
Select a challenge below to begin. Each one tests your skills further! ️
Beginner level challange.
Intermediate level challange.
Advanced level challange. Crack the third encrypted visual set.
Hints: This is a beginner-level challenge to help you understand the system you're dealing with.
Solving this will not grant a ticket, but you can join our Discord community via this link.
Check the R channel.
Analyze EXIF/metadata sections.
Characters are randomized and encrypted.
SHA256 of the message:
dd670272319d026e3cdcf8219463c6a9ba7604ee824815a7323aeb8f0098eb33
fl3cJ0bffaf1Rel214LU1fS#125H5{d47X70lav1czf!0i_fb`cfd9f47ba4jf['9v22d|E232081>77bfRbd^R6ccXlx40b505aBf314z2df=184d0_6df35aseS63`m9e{2w69dfe9O89\gj2-8d5c1e1"6e85{0aJ8xb+7L\7406d89ey3ejb\d3d115f4>9063tebfc4$9z_6b816b221e18f3eZ47E5e76s1574te50d5>@A8c8[c_#*c1Fc0eb1u38e3934k232179N1V4b1aauxd
Scroll inside the box to view all characters.
Download ImageHint: Intermediate level — solve this challenge to earn your entry ticket to the main hack event.
What you have:
@
.)
.Sha 256 looks like: a004d-----------------------------------------------------------Tip: Inspect the image metadata and pay close attention to irregularities in the R channel.
Hint: Advanced level — combine three hidden visuals to find the solution.
Analyze all three together. Clues are distributed.
void 5: 713b9412264f693eaf206b345ccdb91ea2dfa2f043f88992cfae393c7f100f55void 4: b693653ab93d1f11e1e87b711b7d2eb23ff49023877881e3be6c60a6b93071b2void 3: 3687fea8545a04bb64cbc58824219152f8103ff76d729a94ab771ebeb6fba119void 2: a004d83f43c5bde49b601d71460be56af7486cad7ab6be9805f11e31e7c75931