Return to Unfiction unforum
 a.r.g.b.b 
FAQ FAQ   Search Search 
 
Welcome!
New users, PLEASE read these forum guidelines. New posters, SEARCH before posting and read these rules before posting your killer new campaign. New players may also wish to peruse the ARG Player Tutorial.

All users must abide by the Terms of Service.
Website Restoration Project
This archiving project is a collaboration between Unfiction and Sean Stacey (SpaceBass), Brian Enigma (BrianEnigma), and Laura E. Hall (lehall) with
the Center for Immersive Arts.
Announcements
This is a static snapshot of the
Unfiction forums, as of
July 23, 2017.
This site is intended as an archive to chronicle the history of Alternate Reality Games.
 
The time now is Sun Nov 17, 2024 7:07 am
All times are UTC - 4 (DST in action)
View posts in this forum since last visit
View unanswered posts in this forum
Calendar
 Forum index » Archive » Archive: The Haunted Apiary (Let Op!) » The Haunted Apiary (Let Op!): Puzzles
[PUZZLE? ILB.com:] Stegged pictures?
View previous topicView next topic
Page 3 of 11 [160 Posts]   Goto page: Previous 1, 2, 3, 4, 5, ..., 9, 10, 11  Next
Author Message
Zergling
Guest


Hey that wav file definatly sounds and looks(on a voice anaylyzer) stegged. Enhance the hi frequencies using sound forge and you get a lot of what sounds like modem noise, Maybe it is, and maybe its in plain text?

PostPosted: Mon Jul 26, 2004 2:32 am
 Back to top 
hotblack
Boot

Joined: 24 Jul 2004
Posts: 19

If it was in plain-text within the binary I wouldn't class it as being stegged ;) But the files have already been checked and there isn't anything in plain sight.

PostPosted: Mon Jul 26, 2004 12:33 pm
 View user's profile
 Back to top 
clamatius
Decorated


Joined: 24 Jul 2004
Posts: 209
Location: Seattle

Corrupted images

I took a brief look at bee2_margaretphoto.jpg. I just checked and I'm pretty sure that the corrupted images also include the steganographic message that stegdetect picks up. If you remove the corrupted sections, the image is the same as the non-corrupted one.

I was just hoping against hope that they used the original source image instead of the steg'd one to generate the corrupted ones, but alas... no. Would have saved a lot of looking for a passphrase... Smile

Anyway, I just figured I'd let people know about that dead end to save duplication of effort.

As a sidenote, the inserted text sections aren't pure insertion or overwrite - in other words:

[original data length] + [text length] != [corrupted data length]

[original data length] != [corrupted data length]

Some parts of the text overwrite data in the original and some are inserted.

PostPosted: Mon Jul 26, 2004 7:44 pm
 View user's profile Visit poster's website
 Back to top 
Ed the Fish
Kilroy

Joined: 26 Jul 2004
Posts: 1

Initial stegbreak results

I've run stegbreak today with the default stegbreak rules and the all.lst dictionary from ftp://mirror.sg.depaul.edu/pub/security/openwall.com/wordlists/, and got:

Processed 1 files, found 0 embeddings.
Time: 28248 seconds: Cracks: 158765796, 5620.4 c/s


This isn't a dead end, but it does rule out the obvious (and some not-so-obvious) passphrases.


I'd like to figure out a set of rules that would test every permutation of seven-character passphrases, but I'm not sure if I can do that with a rule or if I should (somehow) create a dictionary that contains every possible seven-character combination.

Any thoughts?

PostPosted: Mon Jul 26, 2004 7:52 pm
 View user's profile
 Back to top 
Wulf
Kilroy

Joined: 26 Jul 2004
Posts: 2

Results and false positive thoughts

I have tried two wordlists, each composed of Robinson Crusoe and Gulliver's Travels and nothing has resulted. However, I am convinced that this image is in fact stegged. Two reason behind this:

1.- The already mentioned 3 star rating stegdetect gave the image.

2.- stegdetect has an -s flag that can modify the sensitivity of the detection algorithms. The higher the number, the more sensitive. The default is 1. I have changed this value exponentially and this has not affected the output from stegdetect.

As others have mentioned, the pass phrase is probably several. I still believe it is worth an effort with standard dictionary attacks until we receive new information/clues that could lead to the breaking of this stegged image.

Thoughts?

PostPosted: Mon Jul 26, 2004 9:59 pm
 View user's profile
 Back to top 
LilSerf
Veteran

Joined: 25 Jul 2004
Posts: 84

I think the best passphrase breaking attempt would be to string together words (perhaps from the MAYDAY text, or hell, from all the stuff we have) together into n-word sentences.

Given the brute-forcing that occurred in the Beast, I'm guessing the PMs chose a big sentence here to eliminate brute force. We can still give it a shot though.

I highly doubt that it's a single word, at least. *shrug*

I've tried hundreds of different phrases (nonsensical and logical both) based on the MAYDAY texts, particularly "Phasmids" and "Want to be Found" (see the wiki, i'll link later). Those two mayday snippets REALLY seem to tie in with this hidden message. At least to me Smile

PostPosted: Mon Jul 26, 2004 10:30 pm
 View user's profile
 Back to top 
PlayCold
Greenhorn

Joined: 24 Jul 2004
Posts: 5

Well, I've tried loads of Bee related stuff, i.e there real names Apis Dorsata (etc), dead bee names, blah I've tried allsorts no luck :S

I was thinking the clue might be in the picture, but my botanical knowledge isn't great (neithers my bee knowledge!)

Worth a shot I guess.

PostPosted: Mon Jul 26, 2004 11:38 pm
 View user's profile MSN Messenger
 Back to top 
madmaxpn
Boot

Joined: 26 Jul 2004
Posts: 14

Perhaps a stupid question, but has anyone tried to search images with Google to find the original? I did a brief trawl last night, searching for "bee2", and in the first 10 pages I had no luck. Obviously if we found the source image, that would cut some corners with the Steganography, but I also suspect it isn't really in keeping with the game; I imagine the password is possible to find...

Someone with more patience could try harder Wink

I don't know if this is possible with stegbreak, but can one try using the various texts recovered from the site, using increasing numbers of consecutive words?

Max

PostPosted: Tue Jul 27, 2004 3:41 am
 View user's profile
 Back to top 
prokat
Boot

Joined: 27 Jul 2004
Posts: 13

new image

Hello-

I've definitely been drawn in by this. I was attempting to guess at the password based on the phrases from the other two images (maybe "drones" and something else) then I discovered a fourth image. It looks like a negative. It comes up false positive in stegdetect.

And contains the phrase "To mend the queen's cuts the Widow" in notepad.

I searched and found the phrase in the compiled story. I didn't see a mention of a 4th bee2 picture yet. Hope it helps.

I got this image by sacrificing my f5 key. Attached! (erm added a 4 to the file name for my own sorting)

PostPosted: Tue Jul 27, 2004 4:22 am
 View user's profile
 Back to top 
madmaxpn
Boot

Joined: 26 Jul 2004
Posts: 14

Re: Results and false positive thoughts

Wulf wrote:

2.- stegdetect has an -s flag that can modify the sensitivity of the detection algorithms. The higher the number, the more sensitive. The default is 1. I have changed this value exponentially and this has not affected the output from stegdetect.


Sensitivity is not equal to accuracy. The higher the number, the more likely you are to get false positives; I ran stegdetect -s100000 * on the bee file and a file of my own which I know contained no stegged data, and they both returned jphide(***). (a friend came up with a good analogy - think of a motion sensor; the higher the sensitivity of the sensor, the more likely it is to go off when nothing is moving, the lower the sensitivity the more blatantly obvious the movement has to be to set off the alarm).

The LOWER the number, the more accurate the results. On the bee photo, -s 0.7 to 0.9 give ** ratings, 0.4 to 0.6 gives * ratings, below that gives a negative. This still suggests that the file contains steganographic content.

No success on my end at breaking the passphrase, I suspect we really will have to find it, in-game.

Max

PostPosted: Tue Jul 27, 2004 8:08 am
 View user's profile
 Back to top 
Guest
Guest


I did a quick look-see, and it appears no one has, as yet, noticed that a paper titled "Hide and Seek: An Introduction to Steganography" was written by a Neils Provos and one Peter Honeyman. Perhaps it's just a coincidence, but I wonder if there's something about this document that could yield some clues.

(Here's the URL: http://niels.xtdnet.nl/papers/practical.pdf )

PostPosted: Tue Jul 27, 2004 10:45 am
 Back to top 
Digerat_X
Greenhorn

Joined: 26 Jul 2004
Posts: 4

Hmmm... I wonder if anyone has tried the sentences from the page that read:
Seek the Truth
Behold the Truth
Reveal the Truth
That is the Law and the whole of the Law
???
The only reason I ask is because those would probably not show under a brute force I would imagine, but since there is supposedly some hidden "truth" in the stegged image, perhaps this is the password or something to do with it.

If someone has already tried these sentences, please let me know. I'll try them myself once I get home (at a friend's house)

PostPosted: Tue Jul 27, 2004 11:02 am
 View user's profile
 Back to top 
FAT_CAP
Kilroy

Joined: 27 Jul 2004
Posts: 2

Probably nothing - but being interested in magick/ occult things the phrase

"That is the Law and the whole of the Law "

...referenced in the post above, seemd very close to the words...

"Do what thou wilt shall be the whole of the law"

which were a "motto" if you will (not really the right word but my brain is a little garbled at the minute)... of Alisteir Crowley - the father of modern magick. This could also have some connection to the Voodoo references which have been noticed - as Crowley's magic teachings and workings were an attempt to pull together all of the different strings of magick at the time, Qabbalah, Tarot, Scrying, ritual, and many others.

PostPosted: Tue Jul 27, 2004 11:22 am
 View user's profile
 Back to top 
LilSerf
Veteran

Joined: 25 Jul 2004
Posts: 84

Guest wrote:
I did a quick look-see, and it appears no one has, as yet, noticed that a paper titled "Hide and Seek: An Introduction to Steganography" was written by a Neils Provos and one Peter Honeyman. Perhaps it's just a coincidence, but I wonder if there's something about this document that could yield some clues.

(Here's the URL: http://niels.xtdnet.nl/papers/practical.pdf )


Well, Neils Provos wrote stegdetect, and JPHIDE and JPSEEK are steganography tools. I think Honeyman is just a bizarre coincidence.

PostPosted: Tue Jul 27, 2004 1:29 pm
 View user's profile
 Back to top 
orbnauticus
Guest


bah... the dictionary attack probably will not be of much help.... if the rules or binary itself could be modified to do an iterative attack on it we would at least know that we covered every single key.. perhaps I will look into that later

PostPosted: Tue Jul 27, 2004 1:56 pm
 Back to top 
Display posts from previous:   Sort by:   
Page 3 of 11 [160 Posts]   Goto page: Previous 1, 2, 3, 4, 5, ..., 9, 10, 11  Next
View previous topicView next topic
 Forum index » Archive » Archive: The Haunted Apiary (Let Op!) » The Haunted Apiary (Let Op!): Puzzles
Jump to:  

You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You can download files in this forum
You cannot post calendar events in this forum



Powered by phpBB © 2001, 2005 phpBB Group