[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

Wtf someone in wykop found this

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 95
Thread images: 18

Strange thing. Another cicada ?
Any information ?
>>
>>59609724
>http://80.233.134.210/
>LzBiZmFlZjYwNjgzOTJjOWM3N2VkMGZmOTc5NjAzOWYzMGU2YWJjN2E2YTY1NmRlOTc4M2M4MTE0NzY4YzdiNDcuaHRtbA==
>base64 to text
>0bfaef6068392c9c77ed0ff9796039f30e6abc7a6a656de9783c8114768c7b47.html
>go there
>5.9.247.121/d34dc0d3
>use modifyheaders plugin for firefox, name is X-0x0ACE-Key, value is ur custom key
>goes to another page
#include <stdio.h>

#define START 774691
#define END 825191

int main(void)
{
int i;
for (i = START; i < END; i ++)
{
printf("%d, ", i);
}
printf("%d", i);

return 0;
}

>you replace the two numbers, it gives you the next step
>I don't have a C compiler downloaded right now, im on winshitdown syndrome 7
>>
>>59610297
who are you quoting?
>>
>>59610297
>you have only 5 seconds to send your solution
Doesn't that mean I have to curl the page, egrep the numbers and then post the results?
>>
>>59610323
Who are you saying this to?
>>
>>59610323
>@59610310
>>
>>59610825
Or be realy quick with ur fingers ;^)
>>
>>59610323
Go back to twitter libtard
>>
File: 1490504684398.png (160KB, 375x736px) Image search: [Google]
1490504684398.png
160KB, 375x736px
>>59610323
>>
https://twitter.com/d34dc0d3?lang=en

found this don't know how important it is.

http://5.9.247.121/index.html

also this
>>
#!/bin/bash

curl --header "X-0x0ACE-Key: rqpRWeogGbrv69RMpWzEdLeNjPam0Xk8lJ7lo1OJKqYZQ285y4nwAVkxDbalPn5K" http://5.9.247.121/d34dc0d3 | egrep -o -s '[0-9]{6,7}'


Right now, this code spits the 2 numbers generated by the website but I don't know how to use them as arguments.

Anyone cares to explain me?
>>
>>59611599
You can use >>59610297 edited as
#include <stdio.h>
int main(int argc, char **argv){
int i;
for (i = argv[1]+1; i < argv[2]; i++)
printf("%d, ",i);
[\code]
and call it as "program ${start} ${end}"
and then you have to post those on input form with name="solution".
Probably...
>>
File: Bait_Not_Even_Once.png (62KB, 625x626px) Image search: [Google]
Bait_Not_Even_Once.png
62KB, 625x626px
>>59610854
>>59610869
>>59611013
>>59611431
>>
>>59610310
jej
>>
File: Screenshot (4).png (67KB, 1191x358px) Image search: [Google]
Screenshot (4).png
67KB, 1191x358px
I dont know if these values would do anything for people trying the puzzle,
>>
Ok, I have the following.

A bash script that downloads the html and greps the two numbers, and then passes those numbers to a C program that uses them as arguments to generate the list.

Any idea to send those numbers as input to the form in the site?
>>
>>59610297
>>59611688
what do you guys want me to compile? I am on loonix with gcc
>>
>>59612658
compile linux
>>
>>59612666
I already did
>>
>>59612635
You could use curl
>>
>>59612673
good.
>>
I just burned myself, anyone wants my code?
>>
>>59613810
anon we share as a community here if you find anything share it.
>>
on the third challenge, are you supposed to take the number in the middle of the two, or a list of every number in between?
>>
>>59612541
they change upon refresh
>>
>>59609724
stop posting your shitty ARG here.
>>
The Game. You just lost.
>>
I GET IT -- the upper and lower bounds are primes! they want all the primes inbetween
>>
>>59615728
i ll do it when I get home, tx!
>>
File: patience.png (316KB, 833x623px) Image search: [Google]
patience.png
316KB, 833x623px
Do I really have to wait 2 days ?
>>
>>59616019
Change the date and time. It's an automated system.
>>
File: header.png (44KB, 1590x533px) Image search: [Google]
header.png
44KB, 1590x533px
>>59616019
Modifying X-Modified-since doesn't work.
I guess maybe we need to really wait for 2 days.
>>
File: date.png (517KB, 1024x768px) Image search: [Google]
date.png
517KB, 1024x768px
>>59616191
I changed the date of my system to 3 April 2017, no effect.
>>
>>59610297
>for (i = START; i < END; i ++)
nah...
>>
>>59616542
What made you think that'll work. Change their system.
There's no such thing as cheating a cicada challenge.
>>
I was excited for a minute then but then I remembered I don't know how to code so it doesn't matter.
>>
Anyone managed to get the pattern type done?
I'm struggling to pipe the output to a c/java program and pipe the result back to the page
>>
>>59616706
use tampermonkey? seems like it'd be easier
>>
>>59616706
I used burp on that one.
>>
I don't understand anything you guys are taking about but this sounds fun. What is it?
>>
>>59609724
sorry senpai, what is wykop?
you mean the community that insults polish pope pawlak II?
>>
>>59616906
Just testing your problem solving abilities along with your coding ability and resourcefulness in certain areas... or an IP logger, who knows.
>>
>>59616706
What is the pattern?
>>
>>59616962
the primes between the first and last number
>>
>>59616713
For Tampermonkey:
    var n = $(".challenge").html().replace(']','').replace('[','').replace(' ..., ','').split(',');
var output='';for (var i=(parseInt(n[0])+1);i<parseInt(n[1]);i++) {output=output+i+',';}
$('input[name=solution]').attr('value', output);

Don't forget to include:
// @require http://code.jquery.com/jquery-1.12.4.min.js

in the Tamper monkey header section
>>
>>59617007
actually just realized this doesn't work, although it should... maybe the formatting needs to be different?
>>
link me wykop post, can't find it
>>
Am I supposed to do something with the verification text?
I submit it and the primes but I get the same page back.
>>
>>59617028
In greasemonkey works, but it doesnt output the primes, sadly

Any ideas oh how to implement that?
>>
>>59617371
Yeah I saw that in a previous post and am implementing it now, I'll delete the other post for it is unnecessary and can be confusing, will post an update in a moment...
>>
>>59617355
Or, I guess I get bad request.
Not sure what's going on.
>>59617371
with open('primes1.txt', 'r') as primes:
x=primes.read()
primes = x.split(',')
stuff = []
a = primes.index(start)
b = primes.index(end)
for x in range (a,b):
stuff.append(primes[x])
stuff = ','.join(stuff)

This is how I did it. The text document contains the first million primes sorted like "1,2,3,4".
heh
>>
>>59617439
this is the way I should be doing it, but in JS the primes sorted in a var array rather than txt document. ATM it is taking a long time because it is doing a calculation to determine if the number is a prime, but is this really faster than looping through an array and comparing the number?
>>
>>59617007
Updated with Primes:
var n = $(".challenge").html().replace(']','').replace('[','').replace(' ..., ','').split(',');
var output='';for (var i=(parseInt(n[0])+1);i<parseInt(n[1]);i++){if (isPrime(i)){go(i);}}
function go(number) {output=output+=number+',';$('input[name=solution]').attr('value', output.substring(0, output.length - 1));}
function isPrime(number) {var start = 2;while (start <= Math.sqrt(number)) {if (number % start++ < 1) return false;}return number > 1;}


This works but you still need to click "submit" because I am too lazy to make it fire automatically.
>>
How the hell did you guys solve this? What kind of knowledge do you need for something like this
>>
>>59617525
elementary web developing and middle school math
actually this should become the new fizzbuzz
>>
>>59617525
>What kind of knowledge do you need for something like this

you need autism my friend
>>
File: shooretrdpeppe.jpg (7KB, 189x189px) Image search: [Google]
shooretrdpeppe.jpg
7KB, 189x189px
>>59610323

leave
>>
File: file.png (318KB, 808x648px) Image search: [Google]
file.png
318KB, 808x648px
>>59617503
I had no idea why it was downloading a file called "d34dc0d3" with no file extension over and over
>>
>>59617462
>but is this really faster than looping through an array and comparing the number?
They're about the same.
Iterating though the list is barely slower because I have to do an if statement/compare the numbers.
¯\_(ツ)_/¯
>>
>>59617607
>no idea why it was downloading a file called "d34dc0d3"
https://www.google.com.au/search?q=d34dc0d3&num=50&client=firefox-b&source=lnms&tbm=isch&sa=X&ved=0ahUKEwjQkp_DgPnSAhVQ52MKHXjhDzsQ_AUICSgC&biw=1920&bih=1008
>>
>>59617607
was the file empty?
>>
File: file.png (6KB, 504x178px) Image search: [Google]
file.png
6KB, 504x178px
>>59617650
>>59617641
no. it is a plaintext file with no extension containing pic related, linking to >>59617607 http://80.233.134.207/0x00000ACE.html
>>
File: Possible clue.png (55KB, 797x467px) Image search: [Google]
Possible clue.png
55KB, 797x467px
>>59617607
>>59617620
Return to the packing station in 32676 Lügde
>>
>>59609724
>>59616019
Obviously, OP made this ARG.
Why else would he give us the 'time to come back' in CET?
>>
File: .png (672KB, 1018x571px) Image search: [Google]
.png
672KB, 1018x571px
>>
>>59617727
which sub?
>>
File: 1464777233712.jpg (155KB, 700x1396px) Image search: [Google]
1464777233712.jpg
155KB, 700x1396px
>>59617734
Learn to google better.
>>
>>59617734
/r/ARG/comments/600fxd/found_this_on_my_way_home_today_they_call/
>>
https://arhivach.org/thread/248473/
>>
>>59617746
thanx man for the useful information.
>>
>>59617799
No worries.
>>59617641
>>59617695
And yes this is a potential clue. There was never just one way to solve these.
Consider how dormant that account it.
>>
File: .png (4KB, 400x210px) Image search: [Google]
.png
4KB, 400x210px
This would look much nicer if I used lxml.html but I guess it doesn't matter.
Everyone should use lxml.html by the way.
import requests
with open('primes1.txt', 'r') as primes:
x=primes.read()
primes = x.split(',')

lol = requests.get('http://80.233.134.210/0bfaef6068392c9c77ed0ff9796039f30e6abc7a6a656de9783c8114768c7b47.html').text
code = lol.split('<b>\n')[1].split('</b>')[0]
url = 'http://'+lol.split('loc">')[1].split('</')[0]
headers={}
headers['X-0x0ACE-Key']=code
ww = requests.get(url, headers=headers)
text = ww.text.split('\n')[16].split('</span>')[0]
verify = ww.text.split('value="')[1].split('" />')[0]
start = text.split(',')[0][1:]
end = text.split(',')[2][1:-1]
stuff = []
a = primes.index(start)
b = primes.index(end)
for x in range (a+1,b):
stuff.append(primes[x])
stuff = ','.join(stuff)
data = {}
data['verification']=verify
data['solution']=stuff
last = requests.post(url,headers=headers, data=data)
print(last.text)

:^)
>>
>>59617894
Forgot the first step. fug
I think everything besides the primes thing is static anyway.
>>
>>59617894
I'm now jelly cause I can't write such nice web dev. code. Fuck you (/s).
source:
>am a filthy C dev.
>>
>>59617894
>python
>>
>>59617894
I don't think that would work as range limits and verification change upon refresh and requests.post doesn't account for that. Maybe you should open a session() first?
>>
>>59609724
>wykop
i have no interest in cucks and bug related meme ARGs
>>
File: .png (28KB, 917x475px) Image search: [Google]
.png
28KB, 917x475px
>>59618403
>>
>>59618491
maybe I was doing something else wrong then as I had to switch to session
>>
>>59616945

fuck off /Pol/e
>>
>>59618491
I got a very similar solution. I used regular bash tools to do the parsing though. If the curled file is named "outp", this can be done to extract the bounds:
grep -Eo "\[.*?\]" outp | tr -cs '[:digit:]' ' '


Similarly, this can be done to extract the verification:
grep -Eo "value.*" outp | sed 's/.*"\(.*\)".*/\1/'


I then passed those into my Python script.

Thanks, OP, for a fun problem.
>>
>>59611520
For the index.html part it just seems they are running an nginx server on their debian machine, i guess they didn't want to change it since the most important parts are hidden
>>
Wypierdalaj z tym na wykop. Jeszcze tego gówna tutaj brakowało
>>
can someone use outguess on the image, could be something on it
>>
>>59609724
Wracaj na wykop spierdolino.
>>
>>59616643
Same here man.
>>
File: 1489248674494.jpg (36KB, 655x527px) Image search: [Google]
1489248674494.jpg
36KB, 655x527px
Virgins: the thread
>>
>>59610875
>>59617894
>using the smiley with a carat nose
>>
>>59620630

>2017
>being morally corrupt

You'll be in my prayers tonight.
>>
>>59620485
Nothing senpai

root@ubuntu:~# md5sum ace.jpg
19e4462419a60906592b7c16957b3323 ace.jpg
root@ubuntu:~# md5sum ACE___Pilot_Model___1950.jpg
19e4462419a60906592b7c16957b3323 ACE___Pilot_Model___1950.jpg
root@ubuntu:~#


its the same image from the website
>>
>>59617694
>>59617695
This seems to be the ARG-related part. Some anon in Germany needs to check that place
>>
File: you-just-lost-.jpg (100KB, 640x430px) Image search: [Google]
you-just-lost-.jpg
100KB, 640x430px
>>59609724

FUCK

Roses are red
Violets are blue
I just lost the game
And now so have you
>>
>>59621133
Seconded.
>>
wew...

One-liner for the second (prime stuff) part:

curl 5.9.247.121/d34dc0d3 -H'X-0x0ACE-Key: $KEY' | grep -Eo \(\\[.*\\]\|value=.*\) | tee >(grep -Eo \".*\") >(head -n1 | awk -F\\[\|,\|\\] '{print $2,$4}') | tail -n2 | xargs printf '%s %s %s' | xargs python2 -c 'import sys, requests as r; a=sys.argv; p=",".join(str(i) for i in range(int(a[1])+1,int(a[2])) if not any(i % ii == 0 for ii in range(2,int(i**0.5)+1))); print r.post("http://5.9.247.121/d34dc0d3",headers={"X-0x0ACE-Key":"$KEY"},data=dict(verification=a[3],solution=p)).text'


$KEY is the key from the first part
>>
Double wew.

This is everything from start up til the link to the page with the timer, as a on-liner:

curl 5.9.247.121/d34dc0d3 -H"X-0x0ACE-Key: $(curl 80.233.134.210$(base64 -d <<<$(curl 80.233.134.210 | grep guess-what | awk -F\<\|\> '{ print $3}')) | grep -Eo ^[a-zA-Z0-9].* | cut -d\< -f1)" | grep -Eo \(\\[.*\\]\|value=.*\) | tee >(grep -Eo \".*\") >(head -n1 | awk -F\\[\|,\|\\] '{print $2,$4}') | tail -n2 | xargs printf '%s %s %s' | xargs python2 -c "import sys, requests as r; a=sys.argv; p=','.join(str(i) for i in range(int(a[1])+1,int(a[2])) if not any(i % ii == 0 for ii in range(2,int(i**0.5)+1))); print r.post('http://5.9.247.121/d34dc0d3',headers={'X-0x0ACE-Key':\""$(curl 80.233.134.210$(base64 -d <<<$(curl 80.233.134.210 | grep guess-what | awk -F\<\|\> '{ print $3}')) | grep -Eo ^[a-zA-Z0-9].* | cut -d\< -f1)"\"},data=dict(verification=a[3],solution=p)).text"
Thread posts: 95
Thread images: 18


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.