78427939?
29a253dbe3d494581e30dfae3fd363f78427939cf2e467369b0fea2fba0e6c667e37f888d14b2a3 cc1153f552b1cbf9d504436aa9221eb0c123b9f555733dd22 was the full whirlpool output?
And where did you use that?
Correct, thats the phone and now you have to slice it out of the string since he loses it.
Ah got it now. Final script is posted here:
https://github.com/hank/life/blob/master/code/python/cozzriddle/cozz.pyI was very close. I didn't make the leap to modifying the whirlpool by removing the phone number, but it all makes sense now. Nicely done!
After 5xmd5 = b13260daa9991b92ffc6f1bedbbc1c47
After base64 = YjEzMjYwZGFhOTk5MWI5MmZmYzZmMWJlZGJiYzFjNDc=
After sha1 = 3731663362343732666234313833646461346433393861326662383464663864643964646463336
4
After 2xsha256 = cd3487c5e6d255d798b0376e7338f32be4d13b73c9dec617c7e52c76d383f6ea
After 'cashing in' numbers = cdceddbefbedbcdeccecdfea500euro
After Caesar = fgfhggehiehgefghffhfgihd833hxur
29a253dbe3d494581e30dfae3fd363f78427939cf2e467369b0fea2fba0e6c667e37f888d14b2a3
cc1153f552b1cbf9d504436aa9221eb0c123b9f555733dd22
29a253dbe3d494581e30dfae3fd363fcf2e467369b0fea2fba0e6c667e37f888d14b2a3cc1153f5
52b1cbf9d504436aa9221eb0c123b9f555733dd22
Ripe result = 888ee31308b8c062ff643b790a22aa8acad3db64
gpg --decrypt --passphrase 888ee31308b8c062ff643b790a22aa8acad3db64 /tmp/foo
You need a passphrase to unlock the secret key for
user: "Cozz Lovan <
cozz00lovan@yahoo.com>"
2048-bit RSA key, ID A2C6AE1F, created 2012-12-29 (main key ID 160483CB)
gpg: encrypted with 2048-bit RSA key, ID A2C6AE1F, created 2012-12-29
"Cozz Lovan <
cozz00lovan@yahoo.com>"
5J1TxGPBqgJmpDqJPwkLE43nTsSyvDHjuCefgcfbKoqhc5Wfek7