Wtf someone in wykop found this

Strange thing. Another cicada ?
Any information ?

Other urls found in this thread:

80.233.134.210/
twitter.com/d34dc0d3?lang=en
5.9.247.121/index.html
5.9.247.121/d34dc0d3
google.com.au/search?q=d34dc0d3&num=50&client=firefox-b&source=lnms&tbm=isch&sa=X&ved=0ahUKEwjQkp_DgPnSAhVQ52MKHXjhDzsQ_AUICSgC&biw=1920&bih=1008
80.233.134.207/0x00000ACE.html
arhivach.org/thread/248473/
80.233.134.210/0bfaef6068392c9c77ed0ff9796039f30e6abc7a6a656de9783c8114768c7b47.html').text
twitter.com/SFWRedditGifs

>80.233.134.210/
>LzBiZmFlZjYwNjgzOTJjOWM3N2VkMGZmOTc5NjAzOWYzMGU2YWJjN2E2YTY1NmRlOTc4M2M4MTE0NzY4YzdiNDcuaHRtbA==
>base64 to text
>0bfaef6068392c9c77ed0ff9796039f30e6abc7a6a656de9783c8114768c7b47.html
>go there
>5.9.247.121/d34dc0d3
>use modifyheaders plugin for firefox, name is X-0x0ACE-Key, value is ur custom key
>goes to another page
#include

#define START 774691
#define END 825191

int main(void)
{
int i;
for (i = START; i < END; i ++)
{
printf("%d, ", i);
}
printf("%d", i);

return 0;
}

>you replace the two numbers, it gives you the next step
>I don't have a C compiler downloaded right now, im on winshitdown syndrome 7

who are you quoting?

@59610310
Kill yourself, you dumb fucking shit stain.

>you have only 5 seconds to send your solution
Doesn't that mean I have to curl the page, egrep the numbers and then post the results?

Who are you saying this to?

>@59610310

Or be realy quick with ur fingers ;^)

Go back to twitter libtard

...

twitter.com/d34dc0d3?lang=en

found this don't know how important it is.

5.9.247.121/index.html

also this

#!/bin/bash

curl --header "X-0x0ACE-Key: rqpRWeogGbrv69RMpWzEdLeNjPam0Xk8lJ7lo1OJKqYZQ285y4nwAVkxDbalPn5K" 5.9.247.121/d34dc0d3 | egrep -o -s '[0-9]{6,7}'


Right now, this code spits the 2 numbers generated by the website but I don't know how to use them as arguments.

Anyone cares to explain me?

You can use edited as
#include
int main(int argc, char **argv){
int i;
for (i = argv[1]+1; i < argv[2]; i++)
printf("%d, ",i);
[\code]
and call it as "program ${start} ${end}"
and then you have to post those on input form with name="solution".
Probably...

...

jej

I dont know if these values would do anything for people trying the puzzle,

Ok, I have the following.

A bash script that downloads the html and greps the two numbers, and then passes those numbers to a C program that uses them as arguments to generate the list.

Any idea to send those numbers as input to the form in the site?

what do you guys want me to compile? I am on loonix with gcc

compile linux

I already did

You could use curl

good.

I just burned myself, anyone wants my code?

user we share as a community here if you find anything share it.

on the third challenge, are you supposed to take the number in the middle of the two, or a list of every number in between?

they change upon refresh

stop posting your shitty ARG here.

The Game. You just lost.

I GET IT -- the upper and lower bounds are primes! they want all the primes inbetween

i ll do it when I get home, tx!

Do I really have to wait 2 days ?

Change the date and time. It's an automated system.

Modifying X-Modified-since doesn't work.
I guess maybe we need to really wait for 2 days.

I changed the date of my system to 3 April 2017, no effect.

>for (i = START; i < END; i ++)
nah...

What made you think that'll work. Change their system.
There's no such thing as cheating a cicada challenge.

I was excited for a minute then but then I remembered I don't know how to code so it doesn't matter.

Anyone managed to get the pattern type done?
I'm struggling to pipe the output to a c/java program and pipe the result back to the page

use tampermonkey? seems like it'd be easier

I used burp on that one.

I don't understand anything you guys are taking about but this sounds fun. What is it?

sorry senpai, what is wykop?
you mean the community that insults polish pope pawlak II?

Just testing your problem solving abilities along with your coding ability and resourcefulness in certain areas... or an IP logger, who knows.

What is the pattern?

the primes between the first and last number

For Tampermonkey:
var n = $(".challenge").html().replace(']','').replace('[','').replace(' ..., ','').split(',');
var output='';for (var i=(parseInt(n[0])+1);i

actually just realized this doesn't work, although it should... maybe the formatting needs to be different?

link me wykop post, can't find it

Am I supposed to do something with the verification text?
I submit it and the primes but I get the same page back.

In greasemonkey works, but it doesnt output the primes, sadly

Any ideas oh how to implement that?

Yeah I saw that in a previous post and am implementing it now, I'll delete the other post for it is unnecessary and can be confusing, will post an update in a moment...

Or, I guess I get bad request.
Not sure what's going on.
with open('primes1.txt', 'r') as primes:
x=primes.read()
primes = x.split(',')
stuff = []
a = primes.index(start)
b = primes.index(end)
for x in range (a,b):
stuff.append(primes[x])
stuff = ','.join(stuff)
This is how I did it. The text document contains the first million primes sorted like "1,2,3,4".
heh

this is the way I should be doing it, but in JS the primes sorted in a var array rather than txt document. ATM it is taking a long time because it is doing a calculation to determine if the number is a prime, but is this really faster than looping through an array and comparing the number?

Updated with Primes:
var n = $(".challenge").html().replace(']','').replace('[','').replace(' ..., ','').split(',');
var output='';for (var i=(parseInt(n[0])+1);i

How the hell did you guys solve this? What kind of knowledge do you need for something like this

elementary web developing and middle school math
actually this should become the new fizzbuzz

>What kind of knowledge do you need for something like this

you need autism my friend

leave

I had no idea why it was downloading a file called "d34dc0d3" with no file extension over and over

>but is this really faster than looping through an array and comparing the number?
They're about the same.
Iterating though the list is barely slower because I have to do an if statement/compare the numbers.
¯\_(ツ)_/¯

>no idea why it was downloading a file called "d34dc0d3"
google.com.au/search?q=d34dc0d3&num=50&client=firefox-b&source=lnms&tbm=isch&sa=X&ved=0ahUKEwjQkp_DgPnSAhVQ52MKHXjhDzsQ_AUICSgC&biw=1920&bih=1008

was the file empty?

no. it is a plaintext file with no extension containing pic related, linking to 80.233.134.207/0x00000ACE.html

Return to the packing station in 32676 Lügde

Obviously, OP made this ARG.
Why else would he give us the 'time to come back' in CET?

...

which sub?

Learn to google better.

/r/ARG/comments/600fxd/found_this_on_my_way_home_today_they_call/

arhivach.org/thread/248473/

thanx man for the useful information.

No worries.
And yes this is a potential clue. There was never just one way to solve these.
Consider how dormant that account it.

This would look much nicer if I used lxml.html but I guess it doesn't matter.
Everyone should use lxml.html by the way.
import requests
with open('primes1.txt', 'r') as primes:
x=primes.read()
primes = x.split(',')

lol = requests.get('80.233.134.210/0bfaef6068392c9c77ed0ff9796039f30e6abc7a6a656de9783c8114768c7b47.html').text
code = lol.split('\n')[1].split('')[0]
url = '')[1].split('')[0]" class="external" rel="nofollow" target="_blank">' lol.split('loc">')[1].split('')[0]
start = text.split(',')[0][1:]
end = text.split(',')[2][1:-1]
stuff = []
a = primes.index(start)
b = primes.index(end)
for x in range (a+1,b):
stuff.append(primes[x])
stuff = ','.join(stuff)
data = {}
data['verification']=verify
data['solution']=stuff
last = requests.post(url,headers=headers, data=data)
print(last.text)

:^)

Forgot the first step. fug
I think everything besides the primes thing is static anyway.

I'm now jelly cause I can't write such nice web dev. code. Fuck you (/s).
source:
>am a filthy C dev.

>python

I don't think that would work as range limits and verification change upon refresh and requests.post doesn't account for that. Maybe you should open a session() first?

>wykop
i have no interest in cucks and bug related meme ARGs

...

maybe I was doing something else wrong then as I had to switch to session

fuck off Sup Forumse

I got a very similar solution. I used regular bash tools to do the parsing though. If the curled file is named "outp", this can be done to extract the bounds:
grep -Eo "\[.*?\]" outp | tr -cs '[:digit:]' ' '


Similarly, this can be done to extract the verification:
grep -Eo "value.*" outp | sed 's/.*"\(.*\)".*/\1/'


I then passed those into my Python script.

Thanks, OP, for a fun problem.

For the index.html part it just seems they are running an nginx server on their debian machine, i guess they didn't want to change it since the most important parts are hidden

Wypierdalaj z tym na wykop. Jeszcze tego gówna tutaj brakowało

can someone use outguess on the image, could be something on it

Wracaj na wykop spierdolino.

Same here man.

Virgins: the thread

>using the smiley with a carat nose

>2017
>being morally corrupt

You'll be in my prayers tonight.

Nothing senpai

root@ubuntu:~# md5sum ace.jpg
19e4462419a60906592b7c16957b3323 ace.jpg
root@ubuntu:~# md5sum ACE___Pilot_Model___1950.jpg
19e4462419a60906592b7c16957b3323 ACE___Pilot_Model___1950.jpg
root@ubuntu:~#


its the same image from the website

This seems to be the ARG-related part. Some user in Germany needs to check that place

FUCK

Roses are red
Violets are blue
I just lost the game
And now so have you

Seconded.

wew...

One-liner for the second (prime stuff) part:

curl 5.9.247.121/d34dc0d3 -H'X-0x0ACE-Key: $KEY' | grep -Eo \(\\[.*\\]\|value=.*\) | tee >(grep -Eo \".*\") >(head -n1 | awk -F\\[\|,\|\\] '{print $2,$4}') | tail -n2 | xargs printf '%s %s %s' | xargs python2 -c 'import sys, requests as r; a=sys.argv; p=",".join(str(i) for i in range(int(a[1])+1,int(a[2])) if not any(i % ii == 0 for ii in range(2,int(i**0.5)+1))); print r.post("5.9.247.121/d34dc0d3",headers={"X-0x0ACE-Key":"$KEY"},data=dict(verification=a[3],solution=p)).text'


$KEY is the key from the first part

Double wew.

This is everything from start up til the link to the page with the timer, as a on-liner:

curl 5.9.247.121/d34dc0d3 -H"X-0x0ACE-Key: $(curl 80.233.134.210$(base64 -d