[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y ] [Home]
4chanarchives logo
Trying to find the content of this file: u.pomf.is/dwsart.db
Images are sometimes not shown due to bandwidth/network limitations. Refreshing the page usually helps.

You are currently reading a thread in /g/ - Technology

Thread replies: 18
Thread images: 5
File: lena_large__.jpg (130 KB, 512x512) Image search: [Google]
lena_large__.jpg
130 KB, 512x512
Trying to find the content of this file: u.pomf.is/dwsart.db

What I've gotten so far:
1. It's a SQLite3 db file
2. The main data is is stored in a BLOB type field in binary. My guess is it's compressed.

I've tried to decompress it with gzip and a few other popular utilities but none worked. Also tried to check the first bytes for info but those gave me nothing.

pic unrelated
>>
Upload binary data somewhere?
>>
>>53519230
is this not the data?
>>
>>53519308
o_o
>>
File: ok.png (68 KB, 603x757) Image search: [Google]
ok.png
68 KB, 603x757
>>53519308
If you check out the content of the DATA column you'll find pic related.
>>
>>53519340
I have to mention that I'm really new/shit at stuff like this so I might be missing something very obvious here.
>>
>>53519340
Run binwalk on it.
>>
>>53519340
oh I see

yea
>>
>>53519392
I ran file -d on a query of "select DATA from cache limit 1"

file is a command that tells you what type of data is in your file.

keep in mind this is a single row of the data, and that's maybe 1/10th of the total output, so run the command yourself.
>>
>>53519459
kek forgot pic

about to go to bed..

that "cracklib password index, big endian (64 bit) idk what that means
>>
>>53519464
ah that's cool. How did you run the command against a single query output? I'm currently checking row per row with a Python script.
>>
>>53519253
>u.pomf.is/dwsart.db
>>
>>53519500
sqlite3 dwsart.db "SELECT DATA FROM cache limit 1" | xxd -g1


that gives hex

sqlite3 dwsart.db "SELECT DATA FROM cache limit 1" > file.txt

I guess
>>
>>53519546
then
"file -r -d file.txt"


70: > 4 belong&,=16,"GLS_BINARY_MSB_FIRST"]
mget(type=1, flag=20, offset=0, o=0, nbytes=3)
mget/64 @0: \001^\n\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000

15: > 0 byte&,=-128,"8086 relocatable (Microsoft)"]
1 == 18446744073709551488 = 0
mget(type=20, flag=20, offset=0, o=0, nbytes=3)
mget/64 @0: \001^\n\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000

13: > 0 search/1,=\000\000\000\000pwV1,"Cracklib password index, big endian ("64-bit")"]
mget(type=20, flag=60, offset=0, o=0, nbytes=3)
mget/64 @0: \001^\n\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000

82: > 0 search/wtb/1,=<?xml,"XML document text"]
mget(type=10, flag=20, offset=1040, o=0, nbytes=3)
mget/64 @1040: \000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000


idk how to find out what the exact data is, if we could do that then it'd be easy I guess
>>
>>53519603
Those are all false positives.
>>
>>53519789
elaborate?
>>
>>53519888
>I found the byte sequence "pwV1", therefore its cracklib
>I found the byte sequence "?>", therefore it's XML
It's just shitting out everything it can match, that output is worthless.
>>
Just ran the output through gzip, zlib and lzma and got nothing.
Thread replies: 18
Thread images: 5

banner
banner
[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y] [Home]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
If a post contains personal/copyrighted/illegal content you can contact me at [email protected] with that post and thread number and it will be removed as soon as possible.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com, send takedown notices to them.
This is a 4chan archive - all of the content originated from them. If you need IP information for a Poster - you need to contact them. This website shows only archived content.