[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

So /sci/ can't figure this out

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 220
Thread images: 25

File: 1409598003819.jpg (1MB, 1200x1200px) Image search: [Google]
1409598003819.jpg
1MB, 1200x1200px
So /sci/ can't figure this out
>>
>>43928006
>>>/b/
>>
>>43928006
it's binary you dipshit
>>
>>43928006
I'm not typing in all those ones and zeros.
>>
I suspect it's just someone fucking with you. I'll play along though. Has anyone put this into a converter, like binary to text?
>>
The first five characters are
[IFYOU
so it's totally binary, but I'm not going to type the whole damn thing for no reason.
>>
>>43928056
>he cant whip out an OCR in java in 5 minutes
lel what are you even doing on /g/
>>
>>43928122
>java
>>>/india/
>>
>>43928102
[IFYOUCANFINDUS][60
first 4 lines
>>
[IFYOUCANFINDUS][696966706F6373][30b14010f3][474554][THEWORLDNEEDSYOU]
>>
>>43928056
>not writing a Python script to scan the image in under 2 minutes and making it translate it for you
[IFYOUCANFINDUS][696966706F6373][30b14010f3][474554][THEWORLDNEEDSYOU]
>>
>>43928199
pls pastebin the python script
>>
>>43928199
>Not giving the image to a online OCR website and let them do it for you.
>>
File: 1409712009716.png (249KB, 1200x949px) Image search: [Google]
1409712009716.png
249KB, 1200x949px
>>43928199
I just used tesseract, and of course gave it a reasonable image to OCR.
>>
>>43928006
DON'T FORGET TO DRINK YOUR OVALTINE
fuck you OP
>>
[IFYOUCANFINDUS][696966706F6373][30b14010f3][474554][THEWORLDNEEDSYOU]

696966706F6373 = iifpocs (MD5)

474554 = GET (Hexadecimal)

iifpocs = 607eb095af3b8ab63f5d005ad5f4e10b (MD5)

obvious hint of the cyrillic F as a substitute for the O.

Go into the charmap and translate the ascii value to the correct character.

i.e.

? - 0444
O - 004F

and then try to correct the inner text based on the different characters.

this bit looks to be an IP address or a date.

[4b14010433] which is 11.20.33.04

http://11.20.33.04.com/
>>
>>43928199
[iifpocs][0±@ó][GET]
>>
>>43928257
Lurk moar. You'll shoot your eye out, kid.
>>
>>43928319
So who's going to be a brave anon and scope out those hotels?
>>
>>43928319
Shit dude, what the fuck. You killed the entire thread, motherfucker. Leave some riddling for the rest of us.
>>
>>43928319
why would it be a virtual subdomain instead of an IP?
>>
>>43928335
I just wangted a Red Ryder carbine-action 200-shot range model air rifle with a compass in the stock, and this thing which tells time.
>>
File: 1402552058693.jpg (3KB, 94x98px) Image search: [Google]
1402552058693.jpg
3KB, 94x98px
>>43928319
>>
>>43928319
Because 11.0.0.0/8 is allocated to the DoD.
>>
>ur a faget
>>
>>43928422
meant to reply to >>43928404
I guess it could be some cyber warrior recruiting shit though. Seemed awfully simple.

Who would work for those authoritarian pieces of shit though, after Snowden? Unless you really needed the money.
>>
>>43928441
I bet it's interesting work if you don't have any scruples. Same with military technology.
>>
>>43928367
>http://11.20.33.04.com/
102 North End Avenue, New York City +1(212)9450100 $522
Crosby Street Hotel 79 Crosby Street, New York City +1(212)2266400 $513
Jet Luxury Resorts St Regis New York 2 East 55th Street at 5th Avenue, New York City +1(213)2251136 $486
The Mark Madisson Avenue at 77 the Street, New York City +1(212)7444300 $453
JW Marriott Essex House New York 160 Central Park South, New York City +1(212)2470300 $584
The Peninsula New York 700 Fifth Avenue , New York City +1(212)9562888 $479
The Pierre 2 East 61st Street at Fifth Avenue, New York City +1(212)8388000 $493
The Plaza Fifth Avenue And Central Park South, New York City +1(212)7593000 $477
Plaza Athenee 37 East 64th Street, New York City +1(212)6064600 $476
Langham Place Fifth Avenue 400 Fifth Avenue , New York City +1(212)6954005 $433
>>
>>43928319
>tfw can't into cryptography

Joining a network security club at my uni on thursday though, so feels better man. I'll learn something cool I'm sure.
>>
>>43928461
So whos gonna go to these places tonight? I live in nj though?
>>
File: 1409605190168.gif (635KB, 180x178px) Image search: [Google]
1409605190168.gif
635KB, 180x178px
>>43928319
>you'll never be this smart
>>
>>43928461
It has nothing to do with 04.com
You'll see that any numbers will work with that website as long as it ends in 04.com. It's referencing a DoD IP address.
>>
>>43928319
>knowing to use MD5 on the string 'iifpocs'
>this "correct the inner text" shit
Ya lost me.
>>
>>43928494
sending a get request to the DoD won't get you van'd right?
>>
So 11.20.33.04 doesn't respond to ping, but maybe it's just ICMP disabled and there's something actually running? Port scanning anyone?
>>
>>43928319
>iifpocs
>iff, "if and only if" in logic
>pocs, or proof of concepts
>"If and only if proof of concepts"

Advertisement for poc||gtfo maybe, lel
>>
>>43928319
how do I become this smart
>>
>>43928319
>>43928507

yeah where in this explanation are you actually doing anything?

why would you just randomly use MD5 twice for no reason? pretty sure you're just making things up there brah
>>
>>43928461
102 12129450100 522
79 12122266400 513
2 55 5 12132251136 486
77 12127444300 453
160 12122470300 584
700 5 12129562888 479
2 61 5 12128388000 493
5 12127593000 477
37 64 12126064600 476
5 400 5 12126954005 433
10212129450100522
7912122266400513
255512132251136486
7712127444300453
16012122470300584
700512129562888479
261512128388000493
512127593000477
376412126064600476
5400512126954005433
>>
>>43928552
!!)E?R'‘!"&d?Q2UQ!2%6Hgq!'DC?E1`$p0„p•bˆ„y&ƒˆ?“Q!'Y0?GsvA!
>>
>>43928547
>>43928507

The MD5 part were just notes, i was playing with some algorithms and accidentally miscopied.

MD5 part isn't all that important, though. The text obviously instructs you to do a GET request on said IP, I just checked the IP out and found the link posted.

Now you could also nmap said IP and see how it goes. I kinda got bored and am watching Godzilla (2014) now.
>>
>>43928552
At first I thought these were IP addresses and ports, but they don't support numbers over 255.
>>
>>43928006
>not cicada PGP key

dropped
>>
>>43928625
>cicada
you mean that scam?

last i recall, they wanted those who "won" to work for free under really strenous hours
>>
>>43928646
doing what?
>>
>>43928662
The info that i did see was about a guy who had "won" and then was kicked out of the group for not getting caught up with things. the only addional info that he said was that they demanded hours equivelent to a job. he was pretty vauge on everything else. i would post source, but i wouldnt even know where to look
>>
>>43928319
there's a lot of Japanese characters in the Source code for that website. 11.20.33.04.com

someone check it out
>>
>>43928691
It's Chinese.
>>
>>43928691
>11.20.33.04.com
this is only one way (obviously the wrong way) of decoding the message
the website is written by a chinese dude and has some of the shittiest js i have seen in my life
>>
>>43928730
>the website is written by a chinese dude and has some of the shittiest js i have seen in my life
How is this not proof it's correct?
>>
>>43928319
>go to site
>hit next city till you get to yours
>it's empty

;_;

what does this guy have against Los angeles

also, what if we messed up and we just got linked to a site that just shows websites
>>
File: welp.jpg (16KB, 179x336px) Image search: [Google]
welp.jpg
16KB, 179x336px
>>43928319
>>
File: mfw out of weed.gif (111KB, 200x200px) Image search: [Google]
mfw out of weed.gif
111KB, 200x200px
>>43928319
>>
You guys are stupid as fuck.
It says "Be sure to drink your ovaltine"
>>
>>43928226
>tesseract

why did I not know about this?
>>
>>43928776
read >>43928257 >>43928408
>>
>http://11.20.33.04.com/
>http://www.04.com/

i really dont think putting .com at the end of an IP address makes any FUCKING SENCE !
>>
File: rms.jpg (65KB, 567x565px) Image search: [Google]
rms.jpg
65KB, 567x565px
>>43928866
well.. its a domain not an ip, who would register such a retarded domain is beyond me
>>
Has anyone tried huffman coding? Use blue and red separately then together.

>why don't you do it
I'm very lazy and don't care much. Whatever it is if it's some kind of freedom fighter I don't want in. Only potential reward for me would be a cash price.

Seems unlikely.
>>
>>43928319
Nice copypasta from /sci/.
https://warosu.org/sci/thread/6730124
>>
>>43928890
are you trolling ?
the domain is 04.com
11.20.33.04 is an IP address
if you put .com at the end of the ip address you get redirected to 04.com

Im trying to say 11.20.33.04.com is not the right clue you idiots just landed on a page with hotels and prices it doesnt mean anything
>>
>>43928935
woah settle down nigga
>>
Could that stuff in the middle be just a hexadecimal representation of more ASCII?

Or base64 encoding?
>>
>>43928935
well the guy who "figured out" that domain is obviously just senselessly babbling giving no real reasons for why anything is what he says it is in his post

the only possibly real thing is the hexadecimal GET translation, everything else in the explanation is literal horse shit, which includes the domain that means nothing
>>
>>43928986
>>43929024
Yeah, the middle part, how he "correct[s] the inner text based on the different characters," and then how his result matches up to an IP address or domain is all really unclear to me. I got nothing.
>>
>>43928691
>>43928730
The Chinese is just explaining what the code does you stupid fucks.
>>
>>43928685
>anonymous post on /b/
>legit source
Look at this faggot and laugh.

Who fucking gives a shit what they do.
>>
File: ihavenoideawhatimdoing.jpg (57KB, 460x333px) Image search: [Google]
ihavenoideawhatimdoing.jpg
57KB, 460x333px
>>> base64.encodebytes(bytes.fromhex('30b14010f3'))
b'MLFAEPM=\n'

wat do
>>
File: x-level-bullshit.png (150KB, 1920x1080px) Image search: [Google]
x-level-bullshit.png
150KB, 1920x1080px
this is some /x/-tier bullshit

*goes to find a better ocr*
>>
>>43928691
>>43928703
technically you are both right. The language is chinese (I'm fairly certain), however since most of the japanese kanji come from china you could argue that they are japanese characters. It would be like looking at Latin and saying that it used a lot of English characters
>>
File: makinprogress.png (134KB, 1920x1080px) Image search: [Google]
makinprogress.png
134KB, 1920x1080px
>>43929129
making some progress, that long post before seemed to have made some correct assumptions
>>
>>43929143
nobody cares
>>
>>43929129
>still trying to OCR
I just cropped out the numbers, converted it to white-on-black, then fed it through one of those online OCR programs.
>>
>>43929158
or maybe someone learned something?
>>
>>43929180
Everybody knows kanji is chinese characters you dumb motherfucker.
>>
>>43929193
well they do now that I told them
>>
>>43929151
tesseract, dipshit

only errors were some zeros being considered a O and the non latin charactor

IF YOU CAN FIND US,
THE.WORLD NEEDS Yc|>U

[WE CAN SHOW YOU HOW] [YOU ARE RUNNING OUT OF TIME]
O101101101001001010001100101100101001
1110101010101000O11010000O10100111001
0001100100100101001110010001000101010
1010100110101110101011011001101100011
1001001101100011100100110110001101100
O110111001100000011011001000110001101
100011001100110111001100110101110101O
11011001100110011000OO110001000110001
00110100001100000O1100010011000O01100
1100011001101011101010110110011010000
1101110011010000110101001101010011010
001011101010110110101010001001000O100
0101010101110100111101010010010011000
1000100010011100100010101000101010001
0001010011010110010100111101010101010
11101
>>
>being recruited by binary in a jpg
No, thanks. I'm playing video games so I'll be recruited by the Star League to defend the frontier against Xur and the Ko-Dan armada.
>>
>>43928319
No, you got it wrong.

[IFYOUCANFINDUS][696966706F6373][30b14010f3][474554][THEWORLDNEEDSYOU]

696966706F6373 = iifpocs (MD5)

474554 = FOR (Hexadecimal)

iifpocs = 607eb095af3b8ab63f5d005ad5f4e10b (MD5)

obvious hint of the cyrillic F as a substitute for the O.

Go into the charmap and translate the ascii value to the correct character.

i.e.

? - 0444
O - 004F

and then try to correct the inner text based on the different characters.

this bit looks to be a slogan or quip.

[4b14010433] which is YOU444

FOR YOU
>>
>>43929176
>>43929249
fuck off if you think extracting the binary into a text format is the point of this you nescient retards

696966706F6373 is definitely iifpocs, which is for IIFP and OCS, two Microsoft technologies

enwp.org/IIFP
enwp.org/Microsoft_Office_Communications_Server
>>
>>43929319
Why are you projecting so hard, bro? The guy seemed to not know how to OCR it to text so we told him? No shit the rest of us are long past that point.
>>
The character correction seems like bullshit, but the central part really does look like an ip adress.
If you convert it to decimal, then it would be 209132196083, which conveniently converts to 209.132.19.60:83
>>
>>43929288
based post
>>
>>43929358
Depends on endianness. It could also be 104.39.49.72:8048.
>>
>>43929358
/g/ army, rollout!
>>
474554 = 010001110100010101010100 = GET

So far I have
[IFYOUCANFINDUS][IIFP OCS][30b14010f3][GET][THEWORLDNEEDSYOU]


And the only thing I can think of that uses a 10-digit hex are WEP keys...

wait I just thought of something
>>
>>43929433
>wep keys
kek same thought here. tried linksys64reverse but doesn't come up with anything
>>
>>43929433
mysql> select inet_ntoa('30b14010f3');
+-------------------------+
| inet_ntoa('30b14010f3') |
+-------------------------+
| 0.0.0.30 |
+-------------------------+
1 row in set, 1 warning (0.00 sec)


...ok I give up
>>
the file size is kinda big for a jpeg
>>
>>43929205
You are still retarded and what you said was wrong.
>>
>>43929495
Shit, you're right. Any embedded file in this shit?
>>
>>43929495
It might seem that way, but it's just a big file. Try opening and saving it under a different name with maximum quality settings, you'll get a file of about the same size, even slightly larger.
I also tried opening it in a hex editor and checking for anything suspicios, doesn't seem to have anything in it.
>>
>>43929517
that the comments in that websites code is chinese or that many of the characters used can be defined as japanese characters
>>
>>43929517
>>43929554
>still being this autistic about shit
Really, the bigger issue here is people on 4chan who can't tell Chinese and Japanese text apart.
>>
>>43929554
forget about that site. more than likely is unrelated
>>
>>43929563
Why would I have any need to do that?
>>
>>43929495
There's also a number of just zero'd blocks in it, dunno if that's just part of JFIF or what
0001850: d7f2 7a5e f68f 2e2f 89fb 7598 e528 513e  ..z^.../..u..(Q>
0001860: e2f1 1693 23e2 ebe1 81d6 231a c000 0000 ....#.....#.....
0001870: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0001880: 0000 0000 0000 0000 0000 0000 0000 0000 ................
0001890: 0000 0000 0000 0000 0000 0000 0000 0000 ................
00018a0: 0000 0000 0000 0000 0000 0000 0000 0000 ................
00018b0: 0000 0000 0000 0000 0000 0000 0000 0000 ................
00018c0: 0000 0000 0000 0000 0000 0000 0000 0000 ................
00018d0: 0000 0000 0000 0000 0000 0000 0000 0000 ................
00018e0: 79dc 7fca b571 9b3b b99f 45d6 4c96 afde y....q.;..E.L...

also I'm way too tired to get into this shit now
>>
>>43928144
fine then faggot use python or something
>>
>>43929554
No. What you said was that since Japanese uses kanji it is correct to identify those characters as Japanese, which is like saying every fucking language that use Latin alphabets is Latin.
>>
The INET_NTOA's of the three sets of hex numbers are

41.138.222.50 which is ping-able but has fails an nslookup
0.0.0.30 which is a subnet mask if anything at all
0.7.61.186 which when reversed is not ping-able but belongs to 186-61-7-0.speedy.com.ar, an argentine ISP
>>
>>43929575
You don't. But it's kind of retarded that you can't.
>>
>>43929563
to be fair, you would have to know a little of either to tell the difference. Probably just learning hirigana would be sufficient to tell that it's japanese and not chinese
>>43929615
The characters are chinese, which are shared by japanese. I'm not claiming the language is japanese, only the characters could be categorized as such. The same way I am using latin characters to type english
>>
>>43929621
>41.138.222.50
>Public range for Smile Telecoms Tanzania
>AFRINIC
>>
is the phi (golden mean) a clue for TEA encryption?
>>
>>43929643
>to be fair, you would have to know a little of either to tell the difference
Hahaha
No.

Most kanji may look like Chinese characters but they aren't all shared between both languages you fucking moron.
>>
so what's up with the dot after 'THE'?
>>
>>43929727
its hacker le3t speek!!!!!!!!!!!
>>
>>43929644
>AFRINIC
Interesting. I don't understand the connection, but as an aside, afrinic.net is by far the best designed NIC website I've ever seen.

Also the wording of this article which is on the first page of results for "Smile Telecoms Tanzania" is really fucking off-putting:
http://www.balancingact-africa.com/news/en/issue-no-634/top-story/smile-telecoms-offer/en
>Africa seems strangely unprepared
>insurgent challenger
>technology proved a dead-end
>“time to get real and hire the right people on the execution side.” - See more at: http://www.balancingact-africa.com/news/en/issue-no-634/top-story/smile-telecoms-offer/en#sthash.giXutWSZ.dpuf

oh what the fuck I didn't even select that ok I'm nope-ing the fuck out of here.
>>
>>43929314
This is underrated. Thanks Bane.
>>
>>43928369
No, reproducing work is stupid.

Check his work if you want to play puzzle master.
>>
>>43929876
>>>/tv/
>>
>>43928527
IP of 04.com is:

74.63.122.26
>>
>>43928527
Probably not.
But just to be safe, do it from a public WiFi access point with a Raspberry Pi and then destroy it immediately afterwards.
>>
>>43929599
>python
>>>/lgbt/
>>
>>43929968
whois record
Registry Registrant ID:
Registrant Name: FAN, GONG
Registrant Organization:
Registrant Street: 24B1, B Tower, World Trade Plaza,
Registrant City: Shenzhen
Registrant State/Province:
Registrant Postal Code: 518033
Registrant Country: CN
Registrant Phone: +1.8675525604966
Registrant Phone Ext:
Registrant Fax:
Registrant Fax Ext:
Registrant Email: [email protected]
>>
>>43928527
>>43929995
I fear no man, whatcha need me to do? I don't know what DoD is.
>>
>>43930016
I think it's a red herring.
>>
>>43930024
It's the U.S. Department of Defense. Top of the military branch.
>>
>>43930050
Still don't care, what do you need me to do?
>>
>>43930072
Go to bed and rethink your life.
>>
>>43930072
Attempt to connect to 11.20.33.04 and see what happens.
>>
>>43930105
request times out
>>
not sure what that's all about
>>
>>43930121
Okay, now break into the Pentagon and try to connect to it from their network.
>>
>>43929314
>696966706F6373 = iifpocs (MD5)

How does this step work?
>>
File: nothing.jpg (15KB, 604x75px) Image search: [Google]
nothing.jpg
15KB, 604x75px
>>43930105
umm nothing
>>
>>43930145
I'm pretty sure most of that is full of shit.
>>
>>43930159
That's just ICMP packets... lots of servers don't accept ICMP from just anyone.

Plus, I think that post is bogus.
>>
>>43930161
See
>>43928319

Same question. Is it just bullshit? This kind of stuff seems really really interesting but I have no experience with security in general.
>>
>>43930145
$ echo -n iifpocs | md5sum
607eb095af3b8ab63f5d005ad5f4e10b *-

It's full of shit.
>>
wait a minute.. zoom into that reflection
>>
>>43930190
It seems bogus.

I ran some of those strings through an md5 tool and got some different results..... so...

at least the 04.com stuff is bogus, and that throws doubt on the rest.
>>43930016
>>43929968

I'd have more, but I'm posting right before bed and decided to sleep tonight so that I can lift weights tomorrow and after I get done with everything tomorrow I'll see if I have time for a random puzzle I found on an anonymous message board. I haven't even replicated the binary to ascii translation yet. I'd recommend starting there to check the work of these other assholes.
>>
>>43930145
>>43930190
whoever got them MD5 bullshit is copypasta-ing from https://warosu.org/sci/thread/6730124#p6732420

this puzzle seems to be pointing towards a dead end. it's like telling 20 people to pick a tiny little lock with a toothpick over skype on an edge connection. so many possibilities, too little time.
>>
>>43930245
Got something better to do?
>>
>>43930128
Also, the downloaded filesize is like 959KiB when the 4chan thinger says 1.14 MB

I don't know what that's about, maybe we're not getting the whole story... there might be some steganography going on, because 1.14 is pretty hueg for a 1200x1200 JPEG, but it also seems that the quality is turned way up and the compression is off so that might not be bad for a relatively lossless JFIF encode... Like I said, I don't want to run through the numbers.


>>43930227
continuing from here

I'm not a total expert, but I've read a lot of shit about shit over the years.
>>
File: advice.jpg (45KB, 407x405px) Image search: [Google]
advice.jpg
45KB, 407x405px
>>43928040
Thanks!
>>
>>43930072
>Still don't care, what do you need me to do?

kek m8
>>
>>43930145
it's hex, not md5
>>
>>43930269
there was another thread of some anon with a suspicious gif, but when he uploaded it was truncated. maybe 4chines is cutting info and OP didn't count on it and we are stuck
>>
File: 1409122215136.gif (3MB, 320x180px) Image search: [Google]
1409122215136.gif
3MB, 320x180px
>mfw this thread
>>
I'm programmer but I'd like to help.. did you notice, for example, that the OP image consits mostly of 0 and 1?
>>
>>43930390

yeah we got that far, throwing all that junk into a binary translator
>>
>>43930390
no shit sherlock
>>
>>43930145
It's "iifpocs" in hex.
>>
File: 1409289101721.png (17KB, 625x626px) Image search: [Google]
1409289101721.png
17KB, 625x626px
>>43929672
>>
>>43928006
i call bait.
>>
File: value invert.png (527KB, 1200x1200px) Image search: [Google]
value invert.png
527KB, 1200x1200px
I did a value invert in GIMP but I think these are just jpeg artifacts
>>
0101101101001001010001100101100101001
1110101010101000011010000010100111001
0001100100100101001110010001000101010
1010100110101110101011011001101100011
1001001101100011100100110110001101100
0110111001100000011011001000110001101
1000110011001101110011001101011101010
1101100110011001100000110001000110001
0011010000110000001100010011000001100
1100011001101011101010110110011010000
1101110011010000110101001101010011010
0010111010101101101010100010010000100
0101010101110100111101010010010011000
1000100010011100100010101000101010001
0001010011010110010100111101010101010
11101
>>
>>43929621
>0.7.61.186 which when reversed is not ping-able but belongs to 186-61-7-0.speedy.com.ar, an argentine ISP

I work there.
>>
What is this even about? Where did OP get the image?
>>
>>43930452
So it's actually 2 images stuck together huh, that means this is probably not the original.
>>
>>43930490
aliens obviously
>>
>>43929621
It's Ebola
>>
Try ripping the image and checking the end bits for steganography/slack space, since it's rather large for a JPEG.
>>
>>43930453
=
[IFYOUCANFINDUS][696966706F6373][30b14010f3][474554][THEWORLDNEEDSYOU]
when converted to text

[696966706F6373] = iifpocs when converted to text

[30b14010f3] is gibberish in Ascii and unicode


[474554] = GET when converted to text
>>
>>43930631
[30b14010f3] is 209132196083 in decimal
>>
>>43928006
autism_test.jpg

>>43928319
>this bullshit
>>
>>43930648
http://whois.domaintools.com/209.132.196.83
>>
Good luck Ebola-chan!
>>
>>43929319
>Microsoft Lync Server (previously Microsoft Office Communications Server) is real-time communications server software which provides the infrastructure for enterprise instant messaging, presence, VoIP, ad hoc and structured conferences (audio, video and web conferencing) and PSTN connectivity through a third-party gateway or SIP trunk.[1] These features are available within an organization, between organizations and with external users on the public internet or standard phones (on the PSTN as well as SIP trunking).
Uh, I think we're supposed to contact someone. I would install it but
>winshit
>>
>>43930738
http://iifpocs.freeforums.org/
???
>>
>>43930773
Yeah, my thoughts exactly. Someone should just try to install it and try to connect to the ip from >>43929358
That would also explain the GET from the last part.
>>
>>43930809
This looks right.
>>
>>43930809
http://iifpocs.freeforums.org/isn-t-it-though-t3.html

Sounds like /pol/ shit
>>
>>43930738
>>43930809
>>43930820
>>43930834
oh wow.
>>
File: 1408310641453.jpg (41KB, 599x720px) Image search: [Google]
1408310641453.jpg
41KB, 599x720px
>>43930509
ayy lmao
>>
>>43930809
Judging by the fact that this site/the post was created after the original /sci/ thread, I'd say that this is the work of some asshole

>INTELLECTUAL INDIVIDUALS FOR the PRESERVATION OF A CIVILIZED SOCIETY
doesn't exactly match up with IIFPOCS anyway
>>
>>43930853
/thread
>>
>>43930834
>/pol/ shit
I almost wish it were telling us to drink our Ovaltine.
>>
>>43930867
Nah, seems legit. It was created a few hours before the /sci/ post. Also the OP in /sci/ was iifpocs, just like the name on the forum.
>>
>>43928056
write a script.
>>
>>43930876
LOL

so basically we solved /sci/'s shit for /pol/
>>>>>>>>>>>>/out/
>>
>>43930809
that was disappointing

how did you find it?
>>
>>43928494
>It's referencing a DoD IP address
oh god.

Prepping for party van.
>>
>>43930909
you're right, didn't do UTC conversions. GG
>>
>>43928484
>smart
fortunately I'll never be that dumb.
>>
>>43930876
https://www.youtube.com/watch?v=zdA__2tKoIU
>>
>>43930931
209.132.196.83 goes to freeforums.org
so i just checked if iifpocs was a forum there
>>
>>43931009
occam's razor wins again

brb killing self
>>
>>43930834
>Sounds like /pol/ shit
this
seriously /pol/tards, gtfo
>>
>>43930940
What exactly does the DoD do? I have my phone making random connections to DoD IP addresses all the time.
>>
>>43931009
gg, nice work, anon.
>>
>>43928006
The dot and the phi symbol are indicating something
The 2 parts with brackets are showing us lengths, possible also color
or it's all random shit
>>
>>43931183
read the thread, it's already over.
>>
>>43930865
ebin
>>
>>43928552
There's a curious repetition of "121" in there...
>>
>>43931643
a group of hotels in new york having the same area code isn't curious.
>>
File: welp.png (111KB, 1181x1117px) Image search: [Google]
welp.png
111KB, 1181x1117px
so,

its just some edgy kids then.
>>
Chip-Chan learned how to binary.
>>
>>43931867
yes. exactly so
>>
>>43931867
I smell a fedora.
>>
>>43932593
>Fedora meme

back to reddit scumbag
>>
>>43928464
It will be full of faggots who just use metasploit to spy on their girlfriends.
Try http://opensecuritytraining.info/ instead.
>>
File: dc.jpg (15KB, 320x240px) Image search: [Google]
dc.jpg
15KB, 320x240px
>>43930809
http://iifpocs.freeforums.org/
>mfw this is legit and the binary stuff is just ASCII
>>
$ nmap -Pn 11.20.33.04

Starting Nmap 6.47 ( http://nmap.org ) at 2014-09-03 14:37 CEST
Nmap scan report for 11.20.33.4
Host is up (0.048s latency).
Not shown: 999 filtered ports
PORT STATE SERVICE
25/tcp closed smtp

Nmap done: 1 IP address (1 host up) scanned in 4.53 seconds

Sounds like it's just not responding to ping.
>>
File: 1371869396459.png (19KB, 560x398px) Image search: [Google]
1371869396459.png
19KB, 560x398px
>>43928422
>MFW I JUST PORT SCANNED A DOD IP
>>
>>43930339
I examined the hex of this post, he's right.
>>
>>43935502
>implying the guys over at DoD aren't total bros
>implying they don't have better things to do that van a bunch of neckbeards
We're talking DoD, not NSA anon.
>>
>>43930390
>I'm a programmer!
Fucking off would help
>>
>>43932951
No we're going to do actual security stuff like OS hardening and Network offense and defense.

it's training for a capture the flag type of situation basically.

We're going to train for competitions.
>>
>>43930501
are you stupid?
>>
>>43935502
you and thousands of others do this shit every day

they don't care
>>
>>43930218
>http://11.20.33.04.com/
enhance image
>>
>>43928367
>>43928461
fuck it, I'll go to the Crosby if someone wants to meet me. I'm too chicken shit to go alone.
>>
696966706F6373 in base 16 = 2967076124 in base 10
2967076124 = 176.217.253.28
probably doesn't mean anything, I guess

[WECANSHOWYOUHOW][YOUARERUNNINGOUTOFTIME] =
0101101101010111010001010100001101000001010011100101001101001000010011110101011101011001010011110101010101001000010011110101011101011101010110110101100101001111010101010100000101010010010001010101001001010101010011100100111001001001010011100100011101001111010101010101010001001111010001100101010001001001010011010100010101011101


So as a whole we have [IFYOUCANFINDUS][696966706F6373][30b14010f3][474554][THEWORLDNEEDSYOU][WECANSHOWYOUHOW][YOUARERUNNINGOUTOFTIME] =
010110110100100101000110010110010100111101010101010000110100000101001110010001100100100101001110010001000101010101010011010111010101101100110110001110010011011000111001001101100011011000110111001100000011011001000110001101100011001100110111001100110101110101011011001100110011000001100010001100010011010000110000001100010011000001100110001100110101110101011011001101000011011100110100001101010011010100110100010111010101101101010100010010000100010101010111010011110101001001001100010001000100111001000101010001010100010001010011010110010100111101010101010111010101101101010111010001010100001101000001010011100101001101001000010011110101011101011001010011110101010101001000010011110101011101011101010110110101100101001111010101010100000101010010010001010101001001010101010011100100111001001001010011100100011101001111010101010101010001001111010001100101010001001001010011010100010101011101
>>
>>43937245
Notice how there is a 'YOU' in each coherent sentence.
Notice how there are four of them.
>>
>>43937263
>30b14010f3
Is this in MD5 form? What is this a hash for?
well the previous value gives an IP address, don't know about 474554
>>
Is anyone alive?
Fuck you all
>>
>>43937245
Anything interesting about that address?
Anybody?
>>
>>43930809
>http://iifpocs.freeforums.org/
This is probably a ruse website. Aren't hex values usually in caps?
>>
>>43928890
>rms.jpg
what do you call your other pics of him?
>>
>>43937620
>not keeping one and only one picture of RMS in you hard drive at all times
>>
>>43929314
Cyrillic F is the same as a phi, yeah?
>>
>>43929433
>GET
HOLY SHIT LOOK AT YOUR DUBS
>>
>>43928122
>java
lel
bash with imagemagick + tesseract

or even easier:
>>43928209
>>
>>43928780
It's amazing
>>
File: Human_jawbone_left.jpg (405KB, 1000x1050px) Image search: [Google]
Human_jawbone_left.jpg
405KB, 1000x1050px
time is running out guys
>>
File: rms.jpg (105KB, 492x661px) Image search: [Google]
rms.jpg
105KB, 492x661px
>>43937791
>>
>>43928922
Its an anon board.
What does he look smart now?
Like he's trying to sound like he knows something everyone else doesn't?
THERE IS NO HE

r u 12 m8?
Thread posts: 220
Thread images: 25


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.