echo md5('USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.');
The md5 decrypted via md5decrypter.com resolves to:
"SCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries."
The above site has <meta http-equiv="Objective" content="Hash Exploit"> in as well.
Poder is power in Latin as well. Cibernetico might be a latin translation of Cybernetic.... I'm expecting a Latin moto as per usual on these things. Still can't get the hash, tried a number of different capitalisations.
I didn't read this very carefully, but why does 128 bits automatically make it a hash? That's also the block size for AES, and the length of the string "US Cyber Command".
If they expect it to be cracked (which they might, why put it there if you don't expect anyone to crack it) it could be something much simpler. I'd maybe start looking at some sort of substitution scheme or something similar.
i bet they heard of some cyber attack on the government and they wanted to get all you geaks together and you'd come across what they wanted to know and then bam they take the credit and so on becuase they are stupid
So 128 bits? I'd guess they wouldn't use md5 (or any of the md family), which according to wiki leaves haval/ripemd/tiger. I'd go for ripemd-128 (on what the wiki says) although you would expect them to use a NSA blessed algorithm.
I don't think they're expecting it to be cracked, per se, just guessed. I don't have to have defeated the SHA-256 algorithm to find your hashed password in a rainbow table.
results in
9ec4c12949a4f31474f299058ce2b22a