Strange thing. Another cicada ?
Any information ?
Wtf someone in wykop found this
Other urls found in this thread:
80.233.134.210
twitter.com
5.9.247.121
5.9.247.121
google.com.au
80.233.134.207
arhivach.org
80.233.134.210
twitter.com
>80.233.134.210
>LzBiZmFlZjYwNjgzOTJjOWM3N2VkMGZmOTc5NjAzOWYzMGU2YWJjN2E2YTY1NmRlOTc4M2M4MTE0NzY4YzdiNDcuaHRtbA==
>base64 to text
>0bfaef6068392c9c77ed0ff9796039f30e6abc7a6a656de9783c8114768c7b47.html
>go there
>5.9.247.121/d34dc0d3
>use modifyheaders plugin for firefox, name is X-0x0ACE-Key, value is ur custom key
>goes to another page
#include
#define START 774691
#define END 825191
int main(void)
{
int i;
for (i = START; i < END; i ++)
{
printf("%d, ", i);
}
printf("%d", i);
return 0;
}
>you replace the two numbers, it gives you the next step
>I don't have a C compiler downloaded right now, im on winshitdown syndrome 7
who are you quoting?
@59610310
Kill yourself, you dumb fucking shit stain.
>you have only 5 seconds to send your solution
Doesn't that mean I have to curl the page, egrep the numbers and then post the results?
Who are you saying this to?
>@59610310
Or be realy quick with ur fingers ;^)
Go back to twitter libtard
...
found this don't know how important it is.
also this
#!/bin/bash
curl --header "X-0x0ACE-Key: rqpRWeogGbrv69RMpWzEdLeNjPam0Xk8lJ7lo1OJKqYZQ285y4nwAVkxDbalPn5K" 5.9.247.121
Right now, this code spits the 2 numbers generated by the website but I don't know how to use them as arguments.
Anyone cares to explain me?
You can use edited as
#include
int main(int argc, char **argv){
int i;
for (i = argv[1]+1; i < argv[2]; i++)
printf("%d, ",i);
[\code]
and call it as "program ${start} ${end}"
and then you have to post those on input form with name="solution".
Probably...
...
jej
I dont know if these values would do anything for people trying the puzzle,
Ok, I have the following.
A bash script that downloads the html and greps the two numbers, and then passes those numbers to a C program that uses them as arguments to generate the list.
Any idea to send those numbers as input to the form in the site?
what do you guys want me to compile? I am on loonix with gcc
compile linux
I already did
You could use curl
good.
I just burned myself, anyone wants my code?
user we share as a community here if you find anything share it.
on the third challenge, are you supposed to take the number in the middle of the two, or a list of every number in between?
they change upon refresh
stop posting your shitty ARG here.
The Game. You just lost.
I GET IT -- the upper and lower bounds are primes! they want all the primes inbetween
i ll do it when I get home, tx!
Do I really have to wait 2 days ?
Change the date and time. It's an automated system.
Modifying X-Modified-since doesn't work.
I guess maybe we need to really wait for 2 days.
I changed the date of my system to 3 April 2017, no effect.
>for (i = START; i < END; i ++)
nah...
What made you think that'll work. Change their system.
There's no such thing as cheating a cicada challenge.
I was excited for a minute then but then I remembered I don't know how to code so it doesn't matter.
Anyone managed to get the pattern type done?
I'm struggling to pipe the output to a c/java program and pipe the result back to the page
use tampermonkey? seems like it'd be easier
I used burp on that one.
I don't understand anything you guys are taking about but this sounds fun. What is it?
sorry senpai, what is wykop?
you mean the community that insults polish pope pawlak II?
Just testing your problem solving abilities along with your coding ability and resourcefulness in certain areas... or an IP logger, who knows.
What is the pattern?
the primes between the first and last number
For Tampermonkey:
var n = $(".challenge").html().replace(']','').replace('[','').replace(' ..., ','').split(',');
var output='';for (var i=(parseInt(n[0])+1);i
actually just realized this doesn't work, although it should... maybe the formatting needs to be different?
link me wykop post, can't find it
Am I supposed to do something with the verification text?
I submit it and the primes but I get the same page back.
In greasemonkey works, but it doesnt output the primes, sadly
Any ideas oh how to implement that?
Yeah I saw that in a previous post and am implementing it now, I'll delete the other post for it is unnecessary and can be confusing, will post an update in a moment...
Or, I guess I get bad request.
Not sure what's going on.
with open('primes1.txt', 'r') as primes:
x=primes.read()
primes = x.split(',')
stuff = []
a = primes.index(start)
b = primes.index(end)
for x in range (a,b):
stuff.append(primes[x])
stuff = ','.join(stuff)
This is how I did it. The text document contains the first million primes sorted like "1,2,3,4".
heh
this is the way I should be doing it, but in JS the primes sorted in a var array rather than txt document. ATM it is taking a long time because it is doing a calculation to determine if the number is a prime, but is this really faster than looping through an array and comparing the number?
Updated with Primes:
var n = $(".challenge").html().replace(']','').replace('[','').replace(' ..., ','').split(',');
var output='';for (var i=(parseInt(n[0])+1);i
How the hell did you guys solve this? What kind of knowledge do you need for something like this
elementary web developing and middle school math
actually this should become the new fizzbuzz
>What kind of knowledge do you need for something like this
you need autism my friend
leave
I had no idea why it was downloading a file called "d34dc0d3" with no file extension over and over
>but is this really faster than looping through an array and comparing the number?
They're about the same.
Iterating though the list is barely slower because I have to do an if statement/compare the numbers.
¯\_(ツ)_/¯
>no idea why it was downloading a file called "d34dc0d3"
google.com.au
was the file empty?
no. it is a plaintext file with no extension containing pic related, linking to 80.233.134.207
Return to the packing station in 32676 Lügde
Obviously, OP made this ARG.
Why else would he give us the 'time to come back' in CET?
...
which sub?
Learn to google better.
/r/ARG/comments/600fxd/found_this_on_my_way_home_today_they_call/
thanx man for the useful information.
No worries.
And yes this is a potential clue. There was never just one way to solve these.
Consider how dormant that account it.
This would look much nicer if I used lxml.html but I guess it doesn't matter.
Everyone should use lxml.html by the way.
import requests
with open('primes1.txt', 'r') as primes:
x=primes.read()
primes = x.split(',')
lol = requests.get('80.233.134.210
code = lol.split('\n')[1].split('')[0]
url = '')[1].split('')[0]" class="external" rel="nofollow" target="_blank">' lol.split('loc">')[1].split('')[0]
start = text.split(',')[0][1:]
end = text.split(',')[2][1:-1]
stuff = []
a = primes.index(start)
b = primes.index(end)
for x in range (a+1,b):
stuff.append(primes[x])
stuff = ','.join(stuff)
data = {}
data['verification']=verify
data['solution']=stuff
last = requests.post(url,headers=headers, data=data)
print(last.text)
:^)
Forgot the first step. fug
I think everything besides the primes thing is static anyway.
I'm now jelly cause I can't write such nice web dev. code. Fuck you (/s).
source:
>am a filthy C dev.
>python
I don't think that would work as range limits and verification change upon refresh and requests.post doesn't account for that. Maybe you should open a session() first?
>wykop
i have no interest in cucks and bug related meme ARGs
...
maybe I was doing something else wrong then as I had to switch to session
fuck off Sup Forumse
I got a very similar solution. I used regular bash tools to do the parsing though. If the curled file is named "outp", this can be done to extract the bounds:
grep -Eo "\[.*?\]" outp | tr -cs '[:digit:]' ' '
Similarly, this can be done to extract the verification:
grep -Eo "value.*" outp | sed 's/.*"\(.*\)".*/\1/'
I then passed those into my Python script.
Thanks, OP, for a fun problem.
For the index.html part it just seems they are running an nginx server on their debian machine, i guess they didn't want to change it since the most important parts are hidden
Wypierdalaj z tym na wykop. Jeszcze tego gówna tutaj brakowało
can someone use outguess on the image, could be something on it
Wracaj na wykop spierdolino.
Same here man.
Virgins: the thread
>using the smiley with a carat nose
>2017
>being morally corrupt
You'll be in my prayers tonight.
Nothing senpai
root@ubuntu:~# md5sum ace.jpg
19e4462419a60906592b7c16957b3323 ace.jpg
root@ubuntu:~# md5sum ACE___Pilot_Model___1950.jpg
19e4462419a60906592b7c16957b3323 ACE___Pilot_Model___1950.jpg
root@ubuntu:~#
its the same image from the website
This seems to be the ARG-related part. Some user in Germany needs to check that place
FUCK
Roses are red
Violets are blue
I just lost the game
And now so have you
Seconded.
wew...
One-liner for the second (prime stuff) part:
curl 5.9.247.121/d34dc0d3 -H'X-0x0ACE-Key: $KEY' | grep -Eo \(\\[.*\\]\|value=.*\) | tee >(grep -Eo \".*\") >(head -n1 | awk -F\\[\|,\|\\] '{print $2,$4}') | tail -n2 | xargs printf '%s %s %s' | xargs python2 -c 'import sys, requests as r; a=sys.argv; p=",".join(str(i) for i in range(int(a[1])+1,int(a[2])) if not any(i % ii == 0 for ii in range(2,int(i**0.5)+1))); print r.post("5.9.247.121
$KEY is the key from the first part
Double wew.
This is everything from start up til the link to the page with the timer, as a on-liner:
curl 5.9.247.121/d34dc0d3 -H"X-0x0ACE-Key: $(curl 80.233.134.210$(base64 -d