Phase 3 is here, can you solve it?
http://magics.io/
Well its not the period anymore. :<
>>51728476
http://magics.io/images/goodbye-my-friend.jpg
"What do you mean he wasn't in the coffin?"
WHAT THE FUCK
>>51728476
I tried per
"Prove yourselfs to @Andrewmd5 on twitter or @luigiplr and you may get in yet
Or await the next challenge." but he has direct messaging disabled.
Anyway, I'm going to win phase3 so it doesn't matter.
>>51728502
image has a color profile of c2 embedded
there was a tweet that included c2 before
Can we discuss the fact it sounds like these guys have a ghost on there hands?
>>51728546
It wouldn't be all over their personal twitters f.am
>>51728536
Nice.
I'm thinking maybe the comment hint is a references to Ida Horowicz from the movie the Idea of March?
May be a stretch. I'm trying to think of passwords to steghide the image...it's pw protected
>>51728536
Also, yesterday there was an image that when you stripped the red channel out to a file, gave a base64 that was sha256 encrypted.
Anyone know how to pull the color channel out of an image? Want to pull c2 out and see what the resulting file looks like? May give us something to work with...
>>51728476
wdf is this?
>>51728564
its not password protected this time around.
c2 represents camelcase im pretty sure that was for the last phase.
>>51728585
If I try without a passphrase...I get 'Could not extract data with that passphrase.'
So I take that to mean there is no attached data and we should follow the c2 color profile route somehow.
Ideas anyone?
>>51728585
steghide isn't finding anything with a blank password
>>51728611
I thought "May the secret sauce lead you to the keys to which you desire." was going to help find the password.
<!-- Break out your ides, cause ida know what to do.-->
>>51728623
That's been in there the entire time...all through yesterday and today. I think it's static text that doesn't apply as a hint.
It had me going down all kinds of fucking 'ketchup' tangents yesterday, lmao.
>>51728626
We don't have an executable yet, we can't use IDA on anything yet
>>51728623
>>51728626
Ketchup because one of the hints yesterday was 'Red is the key.'
LOL
>>51728502
where did you find this btw?
>>51728673
"e" in "We" on http://magics.io/
I found it by looking at the Source, not just by clicking around
>>51728673
>Ctrl+U
>>51728673
click the 'e'
>>51728673
click the e in "We"
Guys i just downloaded it again and it has a different byte value
New in the HTML:
"What's in a name? That which we call a rose by any other name would smell as sweet."
That's from Romeo and Juliet. Now....how do we get the passphrase from that?
>>51728502
>paint.net lmao
"What's in a name? That which we call a rose by any other name would smell as sweet."
I dont see that.
>>51728708
It changed back.
>>51728705
looks like they stripped the exif data
http://magics.io/images/goodbye-my-friend.jpg
The image was updated again
>>51728626
>Break out your ides
>>51728708
and now another possible shakespeare reference
I wonder if it's related
>>51728708
Maybe the filename of the image is relevant?
>>51728735
confirmed old byte data: 188757 new: 188851
Perhaps the old one was to hard?
>>51728735
it has no password, thanks devs
New image has a zip file payload, no password
http://magics.io/images/goodbye-my-friend.jpg
>>51728502
ok ive been looking at the image any way i can think of
nothing popped out in the hexdump
this part seems weird to me
>>51728765
The image changed for some reason get the new one
>>51728765
>>51728764
in the new one, after it is deciphered I see a reference to matbee-im-sorry.jar
>>51728783
Change file extension to .zip and extract.
You get a matbee-im-sorry.jar (Java file).
I'm still working to find out what to do with it.
>>51728783
the output is a jar
>>51728799
>>51728801
Hence, break out your ides (integrated development environments)
>>51728801
INB4 BOTNET
>>51728825
I had a feeling, that's what it mean. Does anyone have ida?
Oh boy, another Cicada 3301 wannabe, has it been a month already?
Pretty sure they changed the image because you were originally supposed to convert from the c2 color profile to rgb, but that didn't work right for some reason, so they gave us the original RGB to begin with
>>51728801
is the jar hitting the internet in anyway?
>>51728801
>http://magics.io/images/goodbye-my-friend.jpg
sorry, i will not run this jar
>>51728851
Its asking for a password, I think cracking the jar gets you the "key" to join.
>>51728851
https://www.dropbox.com/s/t5r2gnvfktejm5v/matbee-im-sorry.jar?dl=0
idno if this is new, but if you enter the wrong token you go to a page with binary
convert the binary you get a pastebin w/ more binary
convert that and you get a link to this image
>>51728852
Then don't. Theres no need if you know what you're doing.
Well the jar seems to not be hitting the net ran it in a vm
>>51728881
This is where I've been stuck for a while.
>>51728881
That's been there for a while, confirmed red herring
>>51728883
hmm
Wait this challenge is not just decrypting?
>>51728923
Since people claim to do things they didn't, we made sure this one was only solvable by those deserving enough.
However those with brains outside of coding can technically solve it too
Fuuuuck i am close
we NEED A KEY, of type 32bit signed int
>>51728938
>we NEED A KEY, of type 32bit signed in
You need a key. It says it right in the jar
KEEP THE ANSWER TO YOURSELF.
The answer to this program is the key to your entry.
>>51728938
Is brute forcing feasible?
>>51728938KEEP THE ANSWER TO YOURSELF.
The answer to this program is the key to your entry.
http://sheekyforums.com/thread/51706275/technology/any-body-found-the-cypher.html
This challange seems to be getting done way faster, are they dumbing it down?
>>51728979
The payload delivery was not the challenge.
\CA\FE\BA\BE\00\00\001\00T\92'
7: astore_0
8: iconst_0
9: aaload
10: invokestatic #26; //Method java/lang/Integer.decode:(Ljava/lang/String;)Ljava/lang/Integer;
13: invokevirtual #27; //Method java/lang/Integer.intValue:()I
16: bipush -27
18: imul
19: bipush 39
21: iadd
22: ldc #33; //int 1720653868
24: if_icmpne 32
27: ldc #30; //String Correct!
29: goto 34
32: ldc #31; //String Incorrect
34: getstatic #29; //Field java/lang/System.out:Ljava/io/PrintStream;
37: swap
38: invokevirtual #28; //Method java/io/PrintStream.println:(Ljava/lang/String;)V
41: return
42: pop
43: ldc #32; //String Please enter a 32bit signed int
45: goto 34
48: getstatic #37; //Field www.www:Ljava/io/PrintStream;
Exception table:
from to target type
1 51 42 any
}
>>51728997
You're off to a good start
I'm stuck looking at the source code. Am I supposed to compile this somehow? Or make it work?
>>51729078
get out fag pretending to be OP
>>51729107
Its already compiled, you are suppose to crack it.
>>51729107
it does work.
At the risk of exposing something. Basically this code takes a 32 bit signed int, multiplies it by 58, and subtracts 2 from it. Then checks it against the number 1720653869.
>>51729129
>129 â–¶
>>>51729107
How do we get the number then?
>>51729200
>>51729129
i dont think the numbers 58 and 2 are correct?
Someone link this to r/hacking
>>51729209public static final synchronized void main(java.lang.String[]);
Code:
Stack=2, Locals=1, Args_size=1
0: aload_0
1: jsr 7
4: getstatic #37; //Field www.www:Ljava/io/PrintStream;
7: astore_0
8: iconst_0
9: aaload
10: invokestatic #26; //Method java/lang/Integer.decode:(Ljava/lang/String;)Ljava/lang/Integer;
13: invokevirtual #27; //Method java/lang/Integer.intValue:()I
16: bipush 58
18: imul
19: bipush -2
21: iadd
22: ldc #33; //int 172065386
24: if_icmpne 32
27: ldc #30; //String Correct!
29: goto 34
32: ldc #31; //String Incorrect
>>51729216
>being so lazy that you need other people to shitpost for you
Jesus Christ redditors must be top retard.
What is the fucking point apart from filling boredom?
>>51729240
They killed the 20 who got it right so far. Stay away.
>>51729240
That you get to talk to this hunk of man
https://twitter.com/andrewmd5
>>51729240
Blackjack & Hookers.
>>51729234
i got this when i decompiled tho7: astore_0
8: iconst_0
9: aaload
10: invokestatic #26; //Method java/lang/Integer.decode:(Ljava/lang/String;)Ljava/lang/Integer;
13: invokevirtual #27; //Method java/lang/Integer.intValue:()I
16: bipush -27
18: imul
19: bipush 39
21: iadd
22: ldc #33; //int 1720653868
24: if_icmpne 32
27: ldc #30; //String Correct!
29: goto 34
32: ldc #31; //String Incorrect
>>51729290
>>51729316
>>51729290
They are both in there
I ran a decompiler and got this http://pastebin.com/TCiNFWLh
Oh god.
>>51729316
>>51729359
im still stuck lol, when i reverse the mul/add ops i dont get integer values
as in dividing by 58 or -27 doesn't give me a whole number :(
Can someone sum up what this is?
>>51729395
in 32 bit multiplication, the overflow is usually cut off. I assume this is the case here
>>51729398
An ARG with the prize of hanging out with Popcorn Time devs
>>51728881
This leads me to a youtube page...
>>51729420
gtfo. Your tolling me.
>>51729454
that's actually the most accurate thing
>>51729454
He's not.
I wish I could figure shit like this out
>>51729493
The next one will be very different and you'll have a chance to figure it out
>>51729493
Yeah this one is tough. I have tried everything. Dev said you didn't need to know java to solve it. I'm going to start thinking out of the box and stop trying to figure out what this decompile source means.
I wonder...
BOOM I GOT IT
I TOLD YOU I WOULD GET IT
>>51728520
So much quieter this thread
>>51729577
stat for dev confirmation? Could easily be fake
>>51729577
good job my man
http://www.acloudtree.com/hacking-java-bytecode-for-programmers-part4-krakatau-and-the-case-of-the-integer-overflow/ found this for those of us still working
Website changed: http://magics.io
looks like he got it
>>51729577
am i on the right track if i'm trying to combine the 2 different sets of numbers
>>51729577
FUCK I WAS SO CLOSE TO
>>51729601
and same
also this basically means they coppied someone elses puzzle and changed afew numbers for this one
lol
>>51729577
The challenge has been solved. Welcome
............
It took me too long to make a program to keep checking numbers to find the right key...
>>51729601
aw man, now i got it928606148
>>51729699
Same here. I made a bash script to brute force the program. A little too late though I guess
>>51729716
Sucks doesn't it
Oh well, next time
I really should be studying for my finals
What is this all about?
>>51729738
Cracking the codes. apparently.
all the people who have, did vanish though :S
>>51729767
Everyone who cracks the code gets into the Slack and joins the party of folks making the challenges.
>>51729767
Fuck dude over 10k attempts and only 21 people so far have complected this magics challenge thing
new challenge btw
http://magics.io/ketchup
NEW CHALLENGE UP
Look for ketchup in source
>>51729767
how could you say they vanished?
there is no indication of that.
>>51729775
thats actually a fun/good reward
i like it if its true
Phase 4 is live
>>51729794