New thread for spoopy website
http://unked.net84.net/ <-- killed by /b/
http://webcache.googleusercontent.com/search?q=cache:QDQ_yZEqzX8J:unked.net84.net <-- cached version
Just so you know, the cached site makes spoopy noises and then suddenly makes a high pitched really loud noise, so turn your headphones the fuck off.
Okay right before the thread got deleted (!?) a second ago, some anon posted this and then deleted it a minute later.
heres the key sry
It's the disassembled .exe I think.
Wow man, you are a genius! We are looking at this shit for 2 threads, and thus far no one thought about using the unked exe to try to decrypt the text.
I'll start work on this right now!
Does it maybe have to do with the audio thays playing on the site? 6ad6 is a type of part for old radios
your jumpscare is bad and you should feel bad.
Did anyone actually google "unked"?
a. 1. Odd; strange; ugly; old; uncouth.
2. Lonely; dreary; unkard.
Weston is sadly unked without you.
Looks to me like this is just a creepypasta thing, unfortunately
One thing we can definitely deduce though is that if part of the password is in the actual text and not from something external, the only thing the password can be is one of the two double/triple numbers in each line, correct?
The 6AD6 part is probably irrelevant because it's in each line and can't be put into the numbers-only box. Possibly the 6AD6 is the username each time. Following these general rules, there are only 20 or so possible combinations of input/halso/sila, so it can't take that long to systematically try them all.
So? There's clearly something more to it. You have to dig a little to even get the unked file. I don't think someone would go to all the work of making an application that did nothing. I would bet that there's quite a lot more to this.
Site was registered by someone under the name of Kyriakos Kyriako. A lot of results come up about hacking when you look his name up, I haven't looked that far into it, but yeah. Registered by Kyriakos Kyriako
this guy is trying to get people to click the link to install a trojan that will allow him to use your computer as a bot in his botnet. as you can see he is bumping with different IDs. only click if you looking to have your computer used for nefarious activities and spam
And we have this report about - Dr. X and Verification of Frequency to produce Etheric Force from ...... Here's a great little RC hack you can do with the kids this weekend — make your very own RC Blimp! ...... Registrant Name: Kyriakos Kyriako http://www.keelynet.com/news/indexnov13.html
How many people are actually working on this?
Ah. So again I think the short strings or 2 or 3 digit numbers must be the strengths. The password must either be 6AD6 or 476F
And to confirm, DADE724395FAE6E704E829CB4051 as input, 526 as strength, and 476F as password has already been tested to to avail, right?
So while you all have been bitching I've been decoding this shit for the last hour, there is no end result you will end with letter g every time, if you have gotten this far (haven't looked into this but possibly some with the initials KK) is using your PC and trying to eliminate other hackers (for reason unknown) complete waste of time don't bother I've Hurd about shit from this guy in the past and needles to say he's no bueno
Kyriakos Kyriako Hostinger International Ltd. at Website ...
Company: Hostinger International Ltd. (Kyriakos Kyriako). Address: 61 Lordou Vyronos Larnaca 6023 Cyprus Phone: +357.24030130 ...
526 is underlined, meaning it's probably important. Have you tried the yellow string with 6AD6 or 476F as pass and 526 as strength?
Also, 3 lines have odd ones out: 526 is underlined, The yellow line is yellow, and the blue line is blue. I'd say something is special about them and they're going to be used more than once or used in our final decryption.
Because 526 is underlined, I'd say we should use it as strength for now.
>Ig;gy Az;alea Sex Ta;pe le;aked >
doiop:com/IggyAzaleaSexTape [change : to . ]
tha man is using sound frequency to hack, the lines of code are, i dont know, used in some process, run thru the 6ad6 component and it creates sound frequency, you can override electronic systems with sound frequency, you merely overlap it with the same frequency, but amplified
>Oh no he scammed in a shitty zombie game
>Website must be virus!
What we ACTUALLY know is that the person is clearly hiding things in ways that people are meant to find them, like the link in the page source. There's probably something hidden that we're just missing.
Anyone who wishes to continue to work on this even after all the threads inevitably 404, I'll make a skype group. Add mulli.55 to join.
This could actually mean something, assuming this is in the style of 3301.
It could also be 12 AD, as in 6 AD + 6.
For now, I think this is a bit of a stretch.
People should actually join the skype group, because if this goes any deeper we're not finishing it tonight and we won't be coordinated enough tomorrow to do anything; the threads will just waste time explaining what's going on to new people.
sound frequency sent tesla mad.....hack anything with frequency.....Superyacht owner lets college kids hack $80 million ship.
Aug 1, 2013 - A superyacht (which, presumably, has not been hacked) at the ... And how about a hand for the anonymous superyacht-owner-guy who let ...