[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y ] [Home]
4chanarchives logo
Phase 3 is here, can you solve it? http://magics.io/
Images are sometimes not shown due to bandwidth/network limitations. Refreshing the page usually helps.

You are currently reading a thread in /g/ - Technology

Thread replies: 118
Thread images: 6
File: 8wvspt.png (26 KB, 529x135) Image search: [Google]
8wvspt.png
26 KB, 529x135
Phase 3 is here, can you solve it?

http://magics.io/
>>
Well its not the period anymore. :<
>>
>>51728476
http://magics.io/images/goodbye-my-friend.jpg
>>
"What do you mean he wasn't in the coffin?"

WHAT THE FUCK
>>
>>51728476
I tried per
"Prove yourselfs to @Andrewmd5 on twitter or @luigiplr and you may get in yet

Or await the next challenge." but he has direct messaging disabled.

Anyway, I'm going to win phase3 so it doesn't matter.
>>
>>51728502
image has a color profile of c2 embedded

there was a tweet that included c2 before
>>
Can we discuss the fact it sounds like these guys have a ghost on there hands?
>>
>>51728546
It wouldn't be all over their personal twitters f.am
>>
>>51728536
Nice.

I'm thinking maybe the comment hint is a references to Ida Horowicz from the movie the Idea of March?

May be a stretch. I'm trying to think of passwords to steghide the image...it's pw protected
>>
>>51728536
Also, yesterday there was an image that when you stripped the red channel out to a file, gave a base64 that was sha256 encrypted.

Anyone know how to pull the color channel out of an image? Want to pull c2 out and see what the resulting file looks like? May give us something to work with...
>>
>>51728476
wdf is this?
>>
>>51728564
its not password protected this time around.
>>
c2 represents camelcase im pretty sure that was for the last phase.
>>
>>51728585
If I try without a passphrase...I get 'Could not extract data with that passphrase.'

So I take that to mean there is no attached data and we should follow the c2 color profile route somehow.

Ideas anyone?
>>
>>51728585
steghide isn't finding anything with a blank password
>>
>>51728611

I thought "May the secret sauce lead you to the keys to which you desire." was going to help find the password.
>>
<!-- Break out your ides, cause ida know what to do.-->
>>
>>51728623
That's been in there the entire time...all through yesterday and today. I think it's static text that doesn't apply as a hint.

It had me going down all kinds of fucking 'ketchup' tangents yesterday, lmao.
>>
>>51728626
We don't have an executable yet, we can't use IDA on anything yet
>>
>>51728623
>>51728626
Ketchup because one of the hints yesterday was 'Red is the key.'

LOL
>>
>>51728502
where did you find this btw?
>>
>>51728673
"e" in "We" on http://magics.io/

I found it by looking at the Source, not just by clicking around
>>
>>51728673
>Ctrl+U
>>
>>51728673
click the 'e'
>>
>>51728673
click the e in "We"
>>
Guys i just downloaded it again and it has a different byte value
>>
New in the HTML:

"What's in a name? That which we call a rose by any other name would smell as sweet."

That's from Romeo and Juliet. Now....how do we get the passphrase from that?
>>
>>51728502
>paint.net lmao
>>
"What's in a name? That which we call a rose by any other name would smell as sweet."

I dont see that.
>>
>>51728708
It changed back.
>>
>>51728705
looks like they stripped the exif data
>>
http://magics.io/images/goodbye-my-friend.jpg

The image was updated again
>>
>>51728626
>Break out your ides
>>51728708
and now another possible shakespeare reference

I wonder if it's related
>>
>>51728708
Maybe the filename of the image is relevant?
>>
>>51728735

confirmed old byte data: 188757 new: 188851

Perhaps the old one was to hard?
>>
>>51728735
it has no password, thanks devs
>>
New image has a zip file payload, no password

http://magics.io/images/goodbye-my-friend.jpg
>>
File: goodbye-my-friend-detail.jpg (4 KB, 62x62) Image search: [Google]
goodbye-my-friend-detail.jpg
4 KB, 62x62
>>51728502
ok ive been looking at the image any way i can think of

nothing popped out in the hexdump

this part seems weird to me
>>
>>51728765

The image changed for some reason get the new one
>>
>>51728765

>>51728764
in the new one, after it is deciphered I see a reference to matbee-im-sorry.jar
>>
>>51728783
Change file extension to .zip and extract.

You get a matbee-im-sorry.jar (Java file).

I'm still working to find out what to do with it.
>>
>>51728783
the output is a jar
>>
>>51728799
>>51728801
Hence, break out your ides (integrated development environments)
>>
>>51728801

INB4 BOTNET
>>
>>51728825
I had a feeling, that's what it mean. Does anyone have ida?
>>
Oh boy, another Cicada 3301 wannabe, has it been a month already?
>>
Pretty sure they changed the image because you were originally supposed to convert from the c2 color profile to rgb, but that didn't work right for some reason, so they gave us the original RGB to begin with
>>
>>51728801

is the jar hitting the internet in anyway?
>>
>>51728801
>http://magics.io/images/goodbye-my-friend.jpg
sorry, i will not run this jar
>>
>>51728851
Its asking for a password, I think cracking the jar gets you the "key" to join.
>>
>>51728851
https://www.dropbox.com/s/t5r2gnvfktejm5v/matbee-im-sorry.jar?dl=0
>>
File: maxresdefault.jpg (53 KB, 1440x800) Image search: [Google]
maxresdefault.jpg
53 KB, 1440x800
idno if this is new, but if you enter the wrong token you go to a page with binary
convert the binary you get a pastebin w/ more binary
convert that and you get a link to this image
>>
>>51728852

Then don't. Theres no need if you know what you're doing.
>>
Well the jar seems to not be hitting the net ran it in a vm
>>
>>51728881
This is where I've been stuck for a while.
>>
>>51728881
That's been there for a while, confirmed red herring
>>
>>51728883
hmm
>>
Wait this challenge is not just decrypting?
>>
>>51728923
Since people claim to do things they didn't, we made sure this one was only solvable by those deserving enough.

However those with brains outside of coding can technically solve it too
>>
Fuuuuck i am close

we NEED A KEY, of type 32bit signed int
>>
>>51728938
>we NEED A KEY, of type 32bit signed in

You need a key. It says it right in the jar

KEEP THE ANSWER TO YOURSELF.

The answer to this program is the key to your entry.
>>
>>51728938
Is brute forcing feasible?
>>
>>51728938
KEEP THE ANSWER TO YOURSELF.


The answer to this program is the key to your entry.
>>
http://sheekyforums.com/thread/51706275/technology/any-body-found-the-cypher.html
>>
This challange seems to be getting done way faster, are they dumbing it down?
>>
>>51728979
The payload delivery was not the challenge.
>>
\CA\FE\BA\BE\00\00\001\00T\92'
7: astore_0
8: iconst_0
9: aaload
10: invokestatic #26; //Method java/lang/Integer.decode:(Ljava/lang/String;)Ljava/lang/Integer;
13: invokevirtual #27; //Method java/lang/Integer.intValue:()I
16: bipush -27
18: imul
19: bipush 39
21: iadd
22: ldc #33; //int 1720653868
24: if_icmpne 32
27: ldc #30; //String Correct!
29: goto 34
32: ldc #31; //String Incorrect
34: getstatic #29; //Field java/lang/System.out:Ljava/io/PrintStream;
37: swap
38: invokevirtual #28; //Method java/io/PrintStream.println:(Ljava/lang/String;)V
41: return
42: pop
43: ldc #32; //String Please enter a 32bit signed int
45: goto 34
48: getstatic #37; //Field www.www:Ljava/io/PrintStream;
Exception table:
from to target type
1 51 42 any

}
>>
>>51728997
You're off to a good start
>>
I'm stuck looking at the source code. Am I supposed to compile this somehow? Or make it work?
>>
>>51729078

get out fag pretending to be OP
>>
>>51729107
Its already compiled, you are suppose to crack it.
>>
>>51729107
it does work.

At the risk of exposing something. Basically this code takes a 32 bit signed int, multiplies it by 58, and subtracts 2 from it. Then checks it against the number 1720653869.
>>
>>51729129
>129 â–¶
>>>51729107

How do we get the number then?
>>
>>51729200
>>51729129
i dont think the numbers 58 and 2 are correct?
>>
Someone link this to r/hacking
>>
>>51729209
 public static final synchronized void main(java.lang.String[]);
Code:
Stack=2, Locals=1, Args_size=1
0: aload_0
1: jsr 7
4: getstatic #37; //Field www.www:Ljava/io/PrintStream;
7: astore_0
8: iconst_0
9: aaload
10: invokestatic #26; //Method java/lang/Integer.decode:(Ljava/lang/String;)Ljava/lang/Integer;
13: invokevirtual #27; //Method java/lang/Integer.intValue:()I
16: bipush 58
18: imul
19: bipush -2
21: iadd
22: ldc #33; //int 172065386
24: if_icmpne 32
27: ldc #30; //String Correct!
29: goto 34
32: ldc #31; //String Incorrect
>>
File: 1438820665798.jpg (58 KB, 450x443) Image search: [Google]
1438820665798.jpg
58 KB, 450x443
>>51729216
>being so lazy that you need other people to shitpost for you
Jesus Christ redditors must be top retard.
>>
What is the fucking point apart from filling boredom?
>>
>>51729240

They killed the 20 who got it right so far. Stay away.
>>
>>51729240

That you get to talk to this hunk of man

https://twitter.com/andrewmd5
>>
>>51729240

Blackjack & Hookers.
>>
>>51729234
i got this when i decompiled tho
 7:    astore_0
8: iconst_0
9: aaload
10: invokestatic #26; //Method java/lang/Integer.decode:(Ljava/lang/String;)Ljava/lang/Integer;
13: invokevirtual #27; //Method java/lang/Integer.intValue:()I
16: bipush -27
18: imul
19: bipush 39
21: iadd
22: ldc #33; //int 1720653868
24: if_icmpne 32
27: ldc #30; //String Correct!
29: goto 34
32: ldc #31; //String Incorrect
>>
File: Selection_021.png (64 KB, 890x485) Image search: [Google]
Selection_021.png
64 KB, 890x485
>>51729290
>>
>>51729316
>>51729290
They are both in there

I ran a decompiler and got this http://pastebin.com/TCiNFWLh
>>
Oh god.
>>
>>51729316
>>51729359
im still stuck lol, when i reverse the mul/add ops i dont get integer values
as in dividing by 58 or -27 doesn't give me a whole number :(
>>
Can someone sum up what this is?
>>
>>51729395
in 32 bit multiplication, the overflow is usually cut off. I assume this is the case here
>>
>>51729398
An ARG with the prize of hanging out with Popcorn Time devs
>>
>>51728881
This leads me to a youtube page...
>>
>>51729420

gtfo. Your tolling me.
>>
>>51729454
that's actually the most accurate thing
>>
>>51729454
He's not.
>>
I wish I could figure shit like this out
>>
>>51729493
The next one will be very different and you'll have a chance to figure it out
>>
>>51729493
Yeah this one is tough. I have tried everything. Dev said you didn't need to know java to solve it. I'm going to start thinking out of the box and stop trying to figure out what this decompile source means.
>>
I wonder...
>>
File: win.png (24 KB, 714x110) Image search: [Google]
win.png
24 KB, 714x110
BOOM I GOT IT

I TOLD YOU I WOULD GET IT
>>51728520
>>
So much quieter this thread
>>
>>51729577
stat for dev confirmation? Could easily be fake
>>
>>51729577
good job my man

http://www.acloudtree.com/hacking-java-bytecode-for-programmers-part4-krakatau-and-the-case-of-the-integer-overflow/ found this for those of us still working
>>
Website changed: http://magics.io

looks like he got it
>>
>>51729577
am i on the right track if i'm trying to combine the 2 different sets of numbers
>>
>>51729577
FUCK I WAS SO CLOSE TO
>>51729601
and same

also this basically means they coppied someone elses puzzle and changed afew numbers for this one

lol
>>
>>51729577
The challenge has been solved. Welcome
>>
............

It took me too long to make a program to keep checking numbers to find the right key...
>>
>>51729601
aw man, now i got it
 928606148 
>>
>>51729699
Same here. I made a bash script to brute force the program. A little too late though I guess
>>
>>51729716
Sucks doesn't it

Oh well, next time

I really should be studying for my finals
>>
What is this all about?
>>
>>51729738

Cracking the codes. apparently.

all the people who have, did vanish though :S
>>
>>51729767
Everyone who cracks the code gets into the Slack and joins the party of folks making the challenges.
>>
>>51729767

Fuck dude over 10k attempts and only 21 people so far have complected this magics challenge thing
>>
new challenge btw
http://magics.io/ketchup
>>
NEW CHALLENGE UP

Look for ketchup in source
>>
>>51729767
how could you say they vanished?

there is no indication of that.
>>
>>51729775
thats actually a fun/good reward

i like it if its true
>>
Phase 4 is live

>>51729794
Thread replies: 118
Thread images: 6

banner
banner
[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y] [Home]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
If a post contains personal/copyrighted/illegal content you can contact me at [email protected] with that post and thread number and it will be removed as soon as possible.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com, send takedown notices to them.
This is a 4chan archive - all of the content originated from them. If you need IP information for a Poster - you need to contact them. This website shows only archived content.