Dragons and Dwarves

A wise dragon decided that dwarves were too easily stealing his treasure while he slept. To thwart these villains he has placed his prized possessions inside a magic portal that transmutes the valuables into worthless junk unless one knew the magic pass phrase. The dragon is so confident of his new scheme that he taunts dwarves daring them to try to steal his treasure.

The clever dwarves figured out that there were two obstacles the dragon used to prevent access to his treasure. The first one was easily determined because every time the dwarves tried to throw the worthless junk into the magic portal it spit them back out with a flash of a lightning bolt. The dwarves, being masters of ores, gems, and precious things figured out how to fix the junk. Once the magic portal accepted the junk they then realized there was a fundamental flaw in the ancient magic portal the dragon used and leveraged knowledge and wisdom of their great oracle Goggle to crack the pass phrase and recover the treasure.

We humans want our share of the dragon's loot, but since relations between dwarves and humans is poor, they are unwilling to share any additional information. You must figure out how the dwarves were able to make use of the magic portal and to find the tool they used to access and replace the dragon's valuables with real junk.

We obtained a copy of the dragon's message to the dwarves and have included it in the provided bundle.

Prove that you stole the dragon's valuables by swapping them with some junk of your own. When done correctly, the dragon will wake up to inspect his valuables using his magic pass phrase (aka password) and find in its place junk (or a taunting message of your own).

Download Now

zip
3 KB

Open Positions

Photo: cyber engineer working at a computer

Hardware Security Engineers

Do you like working with microelectronics?

Design test articles for hardware security research, and design new prototype methods including electrical, optical, and other sensing modalities for assessing physical and architectural security properties of microelectronics and embedded systems.

View Open Positions

Photo; Two Cyber engineers working on a computer

Vulnerability Researchers and Reverse Engineers

Do you like understanding how things work and break?

Discover vulnerabilities and debug programs with tools like gdb or QIRA, create automated, scalable and reverse engineering tools and pipelines. Use and build vulnerability research tools that push past the edge of current tools and techniques. 

View Open Positions



Photo: cyber engineer working on a laptop

Embedded, Software, Systems, and Network Engineers

Do you like assessing and evaluating new technology?

Provide advanced day-to-day systems analysis and support for monitoring, troubleshooting, configuring, reporting, implementing, installing, and upgrading core infrastructure hardware, storage, software and/or server-based applications

View Open Positions

Photo: Women working on a tablet

Program Management and Technical Positions

Do you like understanding delivering critical services to support our clients?

Lead the project team with ultimate responsibility for meeting technical, cost schedule, quality, financial and contractual performance. Conduct research and development, manage laboratories, design and manufacture products. 

View Open Positions

 

STAY CONNECTED WITH BATTELLE

Sign up to receive information on new challenges, job opportunities and cyber research.

Get Cyber Careers Updates