Strange thing. Another cicada ?
Any information ?
>>59609724
>http://80.233.134.210/
>LzBiZmFlZjYwNjgzOTJjOWM3N2VkMGZmOTc5NjAzOWYzMGU2YWJjN2E2YTY1NmRlOTc4M2M4MTE0NzY4YzdiNDcuaHRtbA==
>base64 to text
>0bfaef6068392c9c77ed0ff9796039f30e6abc7a6a656de9783c8114768c7b47.html
>go there
>5.9.247.121/d34dc0d3
>use modifyheaders plugin for firefox, name is X-0x0ACE-Key, value is ur custom key
>goes to another page
#include <stdio.h>
#define START 774691
#define END 825191
int main(void)
{
int i;
for (i = START; i < END; i ++)
{
printf("%d, ", i);
}
printf("%d", i);
return 0;
}
>you replace the two numbers, it gives you the next step
>I don't have a C compiler downloaded right now, im on winshitdown syndrome 7
>>59610297
who are you quoting?
>>59610297
>you have only 5 seconds to send your solution
Doesn't that mean I have to curl the page, egrep the numbers and then post the results?
>>59610323
Who are you saying this to?
>>59610323
>@59610310
>>59610825
Or be realy quick with ur fingers ;^)
>>59610323
Go back to twitter libtard
>>59610323
https://twitter.com/d34dc0d3?lang=en
found this don't know how important it is.
http://5.9.247.121/index.html
also this
#!/bin/bash
curl --header "X-0x0ACE-Key: rqpRWeogGbrv69RMpWzEdLeNjPam0Xk8lJ7lo1OJKqYZQ285y4nwAVkxDbalPn5K" http://5.9.247.121/d34dc0d3 | egrep -o -s '[0-9]{6,7}'
Right now, this code spits the 2 numbers generated by the website but I don't know how to use them as arguments.
Anyone cares to explain me?
>>59611599
You can use >>59610297 edited as#include <stdio.h>
int main(int argc, char **argv){
int i;
for (i = argv[1]+1; i < argv[2]; i++)
printf("%d, ",i);
[\code]
and call it as "program ${start} ${end}"
and then you have to post those on input form with name="solution".
Probably...
>>59610854
>>59610869
>>59611013
>>59611431
>>59610310
jej
I dont know if these values would do anything for people trying the puzzle,
Ok, I have the following.
A bash script that downloads the html and greps the two numbers, and then passes those numbers to a C program that uses them as arguments to generate the list.
Any idea to send those numbers as input to the form in the site?
>>59610297
>>59611688
what do you guys want me to compile? I am on loonix with gcc
>>59612658
compile linux
>>59612666
I already did
>>59612635
You could use curl
>>59612673
good.
I just burned myself, anyone wants my code?
>>59613810
anon we share as a community here if you find anything share it.
on the third challenge, are you supposed to take the number in the middle of the two, or a list of every number in between?
>>59612541
they change upon refresh
>>59609724
stop posting your shitty ARG here.
The Game. You just lost.
I GET IT -- the upper and lower bounds are primes! they want all the primes inbetween
>>59615728
i ll do it when I get home, tx!
Do I really have to wait 2 days ?
>>59616019
Change the date and time. It's an automated system.
>>59616019
Modifying X-Modified-since doesn't work.
I guess maybe we need to really wait for 2 days.
>>59616191
I changed the date of my system to 3 April 2017, no effect.
>>59610297
>for (i = START; i < END; i ++)
nah...
>>59616542
What made you think that'll work. Change their system.
There's no such thing as cheating a cicada challenge.
I was excited for a minute then but then I remembered I don't know how to code so it doesn't matter.
Anyone managed to get the pattern type done?
I'm struggling to pipe the output to a c/java program and pipe the result back to the page
>>59616706
use tampermonkey? seems like it'd be easier
>>59616706
I used burp on that one.
I don't understand anything you guys are taking about but this sounds fun. What is it?
>>59609724
sorry senpai, what is wykop?
you mean the community that insults polish pope pawlak II?
>>59616906
Just testing your problem solving abilities along with your coding ability and resourcefulness in certain areas... or an IP logger, who knows.
>>59616706
What is the pattern?
>>59616962
the primes between the first and last number
>>59616713
For Tampermonkey:var n = $(".challenge").html().replace(']','').replace('[','').replace(' ..., ','').split(',');
var output='';for (var i=(parseInt(n[0])+1);i<parseInt(n[1]);i++) {output=output+i+',';}
$('input[name=solution]').attr('value', output);
Don't forget to include:// @require http://code.jquery.com/jquery-1.12.4.min.js
in the Tamper monkey header section
>>59617007
actually just realized this doesn't work, although it should... maybe the formatting needs to be different?
link me wykop post, can't find it
Am I supposed to do something with the verification text?
I submit it and the primes but I get the same page back.
>>59617028
In greasemonkey works, but it doesnt output the primes, sadly
Any ideas oh how to implement that?
>>59617371
Yeah I saw that in a previous post and am implementing it now, I'll delete the other post for it is unnecessary and can be confusing, will post an update in a moment...
>>59617355
Or, I guess I get bad request.
Not sure what's going on.
>>59617371with open('primes1.txt', 'r') as primes:
x=primes.read()
primes = x.split(',')
stuff = []
a = primes.index(start)
b = primes.index(end)
for x in range (a,b):
stuff.append(primes[x])
stuff = ','.join(stuff)
This is how I did it. The text document contains the first million primes sorted like "1,2,3,4".
heh
>>59617439
this is the way I should be doing it, but in JS the primes sorted in a var array rather than txt document. ATM it is taking a long time because it is doing a calculation to determine if the number is a prime, but is this really faster than looping through an array and comparing the number?
>>59617007
Updated with Primes:var n = $(".challenge").html().replace(']','').replace('[','').replace(' ..., ','').split(',');
var output='';for (var i=(parseInt(n[0])+1);i<parseInt(n[1]);i++){if (isPrime(i)){go(i);}}
function go(number) {output=output+=number+',';$('input[name=solution]').attr('value', output.substring(0, output.length - 1));}
function isPrime(number) {var start = 2;while (start <= Math.sqrt(number)) {if (number % start++ < 1) return false;}return number > 1;}
This works but you still need to click "submit" because I am too lazy to make it fire automatically.
How the hell did you guys solve this? What kind of knowledge do you need for something like this
>>59617525
elementary web developing and middle school math
actually this should become the new fizzbuzz
>>59617525
>What kind of knowledge do you need for something like this
you need autism my friend
>>59610323
leave
>>59617503
I had no idea why it was downloading a file called "d34dc0d3" with no file extension over and over
>>59617462
>but is this really faster than looping through an array and comparing the number?
They're about the same.
Iterating though the list is barely slower because I have to do an if statement/compare the numbers.
¯\_(ツ)_/¯
>>59617607
>no idea why it was downloading a file called "d34dc0d3"
https://www.google.com.au/search?q=d34dc0d3&num=50&client=firefox-b&source=lnms&tbm=isch&sa=X&ved=0ahUKEwjQkp_DgPnSAhVQ52MKHXjhDzsQ_AUICSgC&biw=1920&bih=1008
>>59617607
was the file empty?
>>59617650
>>59617641
no. it is a plaintext file with no extension containing pic related, linking to >>59617607 http://80.233.134.207/0x00000ACE.html
>>59617607
>>59617620
Return to the packing station in 32676 Lügde
>>59609724
>>59616019
Obviously, OP made this ARG.
Why else would he give us the 'time to come back' in CET?
>>59617727
which sub?
>>59617734
Learn to google better.
>>59617734
/r/ARG/comments/600fxd/found_this_on_my_way_home_today_they_call/
https://arhivach.org/thread/248473/
>>59617746
thanx man for the useful information.
>>59617799
No worries.
>>59617641
>>59617695
And yes this is a potential clue. There was never just one way to solve these.
Consider how dormant that account it.
This would look much nicer if I used lxml.html but I guess it doesn't matter.
Everyone should use lxml.html by the way.import requests
with open('primes1.txt', 'r') as primes:
x=primes.read()
primes = x.split(',')
lol = requests.get('http://80.233.134.210/0bfaef6068392c9c77ed0ff9796039f30e6abc7a6a656de9783c8114768c7b47.html').text
code = lol.split('<b>\n')[1].split('</b>')[0]
url = 'http://'+lol.split('loc">')[1].split('</')[0]
headers={}
headers['X-0x0ACE-Key']=code
ww = requests.get(url, headers=headers)
text = ww.text.split('\n')[16].split('</span>')[0]
verify = ww.text.split('value="')[1].split('" />')[0]
start = text.split(',')[0][1:]
end = text.split(',')[2][1:-1]
stuff = []
a = primes.index(start)
b = primes.index(end)
for x in range (a+1,b):
stuff.append(primes[x])
stuff = ','.join(stuff)
data = {}
data['verification']=verify
data['solution']=stuff
last = requests.post(url,headers=headers, data=data)
print(last.text)
:^)
>>59617894
Forgot the first step. fug
I think everything besides the primes thing is static anyway.
>>59617894
I'm now jelly cause I can't write such nice web dev. code. Fuck you (/s).
source:
>am a filthy C dev.
>>59617894
>python
>>59617894
I don't think that would work as range limits and verification change upon refresh and requests.post doesn't account for that. Maybe you should open a session() first?
>>59609724
>wykop
i have no interest in cucks and bug related meme ARGs
>>59618491
maybe I was doing something else wrong then as I had to switch to session
>>59616945
fuck off /Pol/e
>>59618491
I got a very similar solution. I used regular bash tools to do the parsing though. If the curled file is named "outp", this can be done to extract the bounds:grep -Eo "\[.*?\]" outp | tr -cs '[:digit:]' ' '
Similarly, this can be done to extract the verification:grep -Eo "value.*" outp | sed 's/.*"\(.*\)".*/\1/'
I then passed those into my Python script.
Thanks, OP, for a fun problem.
>>59611520
For the index.html part it just seems they are running an nginx server on their debian machine, i guess they didn't want to change it since the most important parts are hidden
Wypierdalaj z tym na wykop. Jeszcze tego gówna tutaj brakowało
can someone use outguess on the image, could be something on it
>>59609724
Wracaj na wykop spierdolino.
>>59616643
Same here man.
Virgins: the thread
>>59610875
>>59617894
>using the smiley with a carat nose
>>59620630
>2017
>being morally corrupt
You'll be in my prayers tonight.
>>59620485
Nothing senpairoot@ubuntu:~# md5sum ace.jpg
19e4462419a60906592b7c16957b3323 ace.jpg
root@ubuntu:~# md5sum ACE___Pilot_Model___1950.jpg
19e4462419a60906592b7c16957b3323 ACE___Pilot_Model___1950.jpg
root@ubuntu:~#
its the same image from the website
>>59617694
>>59617695
This seems to be the ARG-related part. Some anon in Germany needs to check that place
>>59609724
FUCK
Roses are red
Violets are blue
I just lost the game
And now so have you
>>59621133
Seconded.
wew...
One-liner for the second (prime stuff) part:curl 5.9.247.121/d34dc0d3 -H'X-0x0ACE-Key: $KEY' | grep -Eo \(\\[.*\\]\|value=.*\) | tee >(grep -Eo \".*\") >(head -n1 | awk -F\\[\|,\|\\] '{print $2,$4}') | tail -n2 | xargs printf '%s %s %s' | xargs python2 -c 'import sys, requests as r; a=sys.argv; p=",".join(str(i) for i in range(int(a[1])+1,int(a[2])) if not any(i % ii == 0 for ii in range(2,int(i**0.5)+1))); print r.post("http://5.9.247.121/d34dc0d3",headers={"X-0x0ACE-Key":"$KEY"},data=dict(verification=a[3],solution=p)).text'
$KEY is the key from the first part
Double wew.
This is everything from start up til the link to the page with the timer, as a on-liner:curl 5.9.247.121/d34dc0d3 -H"X-0x0ACE-Key: $(curl 80.233.134.210$(base64 -d <<<$(curl 80.233.134.210 | grep guess-what | awk -F\<\|\> '{ print $3}')) | grep -Eo ^[a-zA-Z0-9].* | cut -d\< -f1)" | grep -Eo \(\\[.*\\]\|value=.*\) | tee >(grep -Eo \".*\") >(head -n1 | awk -F\\[\|,\|\\] '{print $2,$4}') | tail -n2 | xargs printf '%s %s %s' | xargs python2 -c "import sys, requests as r; a=sys.argv; p=','.join(str(i) for i in range(int(a[1])+1,int(a[2])) if not any(i % ii == 0 for ii in range(2,int(i**0.5)+1))); print r.post('http://5.9.247.121/d34dc0d3',headers={'X-0x0ACE-Key':\""$(curl 80.233.134.210$(base64 -d <<<$(curl 80.233.134.210 | grep guess-what | awk -F\<\|\> '{ print $3}')) | grep -Eo ^[a-zA-Z0-9].* | cut -d\< -f1)"\"},data=dict(verification=a[3],solution=p)).text"