Return to Unfiction unforum
 a.r.g.b.b 
FAQ FAQ   Search Search 
 
Welcome!
New users, PLEASE read these forum guidelines. New posters, SEARCH before posting and read these rules before posting your killer new campaign. New players may also wish to peruse the ARG Player Tutorial.

All users must abide by the Terms of Service.
Website Restoration Project
This archiving project is a collaboration between Unfiction and Sean Stacey (SpaceBass), Brian Enigma (BrianEnigma), and Laura E. Hall (lehall) with
the Center for Immersive Arts.
Announcements
This is a static snapshot of the
Unfiction forums, as of
July 23, 2017.
This site is intended as an archive to chronicle the history of Alternate Reality Games.
 
The time now is Thu Nov 14, 2024 11:25 am
All times are UTC - 4 (DST in action)
View posts in this forum since last visit
View unanswered posts in this forum
Calendar
 Forum index » Archive » Archive: The Haunted Apiary (Let Op!) » The Haunted Apiary (Let Op!): Puzzles
[PUZZLE? ILB.com:] Stegged pictures?
View previous topicView next topic
Page 10 of 11 [160 Posts]   Goto page: Previous 1, 2, 3, ..., 8, 9, 10, 11  Next
Author Message
Gametavern
Guest


is this different from the embedded text?

"Peeled the skin from the body of her subjects, while the queens"

PostPosted: Mon Aug 02, 2004 12:04 am
 Back to top 
sordith
Greenhorn

Joined: 01 Aug 2004
Posts: 6

Since stegbreak has a 16 character limitation, I grabbed a copy of the JPSEEK source with the intentions of writing a brute force version. I know someone already tried doing this in linux on the command line, but if I remember correctly he was using stegbreak, not to mention a single app would be much faster.

The JPSEEK code is awful, and it took me too long to port it to windows and find blowfish code to get it to compile (thank god I had the jpeg library already installed). I can't work with this, but I could easily write a new one from scratch if I could get ahold of the algorithem JPSEEK uses. Anyone know where I can find something like that?

PostPosted: Mon Aug 02, 2004 6:03 am
 View user's profile
 Back to top 
Lorre
Guest


LilSerf wrote:
Another tie-in: check out this Mayday text snippet:

Quote:
MAYDAY MAYDAY MAYDAY
Getting muddled here. Sick, obviously.
Broken inside. Not thinking straight.

Got to go back to first principles.

Survive evade reveal escape.

Survive-well, I'm not dead yet.
Evade-don't want to evade. I want to be FOUND.

...unless...

...of course, if I am behind enemy lines, then constantly shouting for help wouldn't be the smartest play in the world, would it?

got to run silent. got to run deep.

hide and go seek


"Hide and go seek" seems like a big reference to JPHIDE/JPSEEK to me.


Come to think of it... it doesn't!

Hide and seek is a very common English phrase, which the creators of JPHIDE/JPSEEK used to name their program.

And who knows the people at Bungie just used it in that story...because it's a common phrase...this could be pure coincidence actually...

Now if they would talk about an Acrobatic maker of dreams, now THAT would be a reference to Dreamweaver and Adobe Acrobat, just to name a stupid example...

PostPosted: Mon Aug 02, 2004 6:32 am
 Back to top 
Roc
Veteran

Joined: 27 Jul 2004
Posts: 81

Either way Lorre, stegdetect pegs the meter for JPHIDE on bee2_margaretphoto.jpg.
_________________
.. @
O[|]o~


PostPosted: Mon Aug 02, 2004 11:49 am
 View user's profile
 Back to top 
Shad0
I Have No Life


Joined: 20 Jun 2004
Posts: 2180
Location: Southern California, USA

Gametavern wrote:
is this different from the embedded text?

"Peeled the skin from the body of her subjects, while the queens"

If you mean "Is this entire discussion about something other than the embedded text we already found in the corrupted images, like this example?" then yes, it is. They're hoping to find something else intentionally concealed in a particular image -- not in plaintext -- by figuring out the password that was used to hide it. There is an ongoing debate about whether there actually is anything new to find, or whether the 'stegdetect' program has simply returned a false positive.

If you mean "Is this phrase here a new one that no one has found yet?" then nope, sorry. Trout Found here, and solved here.
_________________
These were the puzzles that would take a day, these were puzzles that would take a week, and these puzzles they'd probably never figure out until we broke down and gave them the answers. ... The Cloudmakers solved all of these puzzles on the first day.

PostPosted: Mon Aug 02, 2004 12:45 pm
 View user's profile
 Back to top 
TheDude
Boot

Joined: 27 Jul 2004
Posts: 16

This is a little off topic, but I think Shad0 should get a custom title. He is always right on top of these trouts.

PostPosted: Mon Aug 02, 2004 1:00 pm
 View user's profile
 Back to top 
Gametavern
Guest


Shad0 wrote:
Gametavern wrote:
is this different from the embedded text?

"Peeled the skin from the body of her subjects, while the queens"

If you mean "Is this entire discussion about something other than the embedded text we already found in the corrupted images, like this example?" then yes, it is. They're hoping to find something else intentionally concealed in a particular image -- not in plaintext -- by figuring out the password that was used to hide it. There is an ongoing debate about whether there actually is anything new to find, or whether the 'stegdetect' program has simply returned a false positive.

If you mean "Is this phrase here a new one that no one has found yet?" then nope, sorry. Trout Found here, and solved here.


yeah, i know someone found that already... but you did answer my question thanks.

PostPosted: Mon Aug 02, 2004 8:59 pm
 Back to top 
madmaxpn
Boot

Joined: 26 Jul 2004
Posts: 14

sordith wrote:
Since stegbreak has a 16 character limitation, I grabbed a copy of the JPSEEK source with the intentions of writing a brute force version. I know someone already tried doing this in linux on the command line, but if I remember correctly he was using stegbreak, not to mention a single app would be much faster.


Seems like JP{SEEK/HIDE} uses a 120 characters passphrase, which is really rather large.

sordith wrote:
The JPSEEK code is awful, and it took me too long to port it to windows and find blowfish code to get it to compile (thank god I had the jpeg library already installed). I can't work with this, but I could easily write a new one from scratch if I could get ahold of the algorithem JPSEEK uses. Anyone know where I can find something like that?


Well, as you mentioned above, JPSEEK uses Blowfish, which currently has no effective cryptanalysis. There are various attempts which can break it assuming it uses a certain number of rounds, and some which can break it if a large quantity of known plaintext/cipher-text pairs exist, which, unfortunately, they don't for this passphrase.

The only option is brtueforce, and with 120 characters, that's going to take you a LONG time. Just have a look at jpseek.c, within the function jpseek() there's all the information you need about how to attempt a bruteforce attack on the stegged picture.

Max

(oh yeah, linky to some more information on Blowfish.)

PostPosted: Tue Aug 03, 2004 4:27 am
 View user's profile
 Back to top 
Roc
Veteran

Joined: 27 Jul 2004
Posts: 81

All we really need is a tool that lets us try our own dictionary, and accurately tests pass phrases greater than 16 characters.

Well, that's all I'm looking for anyway.
_________________
.. @
O[|]o~


PostPosted: Tue Aug 03, 2004 8:30 am
 View user's profile
 Back to top 
eMouse
Decorated

Joined: 25 Jul 2004
Posts: 179

Anyone started throwing phrases from the new email at it?

PostPosted: Tue Aug 03, 2004 1:47 pm
 View user's profile
 Back to top 
Elec
Guest


I haven't carefully traced through the whole program, but I'd probably change this:

Code:
pass = getpass("Passphrase: ");
 if (strlen(pass) == 0) {
  fprintf(stderr,"Nothing done\n");
  exit(0);
 } 
 if (strlen(pass) > 120) {
  fprintf(stderr,"Truncated to 120 characters\n");
  pass[120] = 0;
 }


I can't find the getpass function so I'm assuming that there's either a header file missing from the source, or it's some sort of standard get function from one of the libraries. I'd hack that out and use an fopen (you could get a command line argument for the file name but that might require changing something else, it'd be easier to specify the name as dictionary.txt or whatever). Then just do a getline or whatever to pull a line out of the dictionary file. You'd have to add a loop someplace so that the program continues to run, testing each line of the dictionary file. The idea is that you want to change the getpass part so that it's pulling pass phrases from your dictionary file rather than the command line. I could probably do it myself but I don't have access to a Linux env. right now and I'm not real inclined to hunt down all those libraries to make it compile Sad[/code]

PostPosted: Tue Aug 03, 2004 2:07 pm
 Back to top 
subatomicsatan
Boot

Joined: 26 Jul 2004
Posts: 34
Location: in the space above the period at the end of this sentence.

Re: outguess

Quote:

subatomicsatan wrote:
i have been playing around with outguess on bee2_margaretphoto.jpg and need some advice from those more familiar with the tool than i am.


The stegged data (if it is there) wasn't put in by the outguess package, it was put in using JPHIDE, a different stego program that uses a different algorithm than outguess. JPSEEK is the corresponding retrieval tool for stuff that's been JPHIDden. The confusion arises because the author of outguess is the same guy that wrote stegbreak.


(sorry for the delay in responding to this, but i have been out of town)

we assume the alleged stegged data was put there with JPHIDE.

i do not know what the false positive rate of outguess is, but i tried many different jpg's and only the image in question produced output...and said output was 520 bytes in size and we all know by now that 5 + 2 + 0 = 7. Wink

i'm not saying it means anything, but it is interesting. at least to me. Wink

PostPosted: Tue Aug 03, 2004 4:11 pm
 View user's profile AIM Address
 Back to top 
Anonymous1
Guest


Has anyone tried anything from the e-mail sent out today? The author talks about showing secret(possibly the stegged info) and then quotes the TMNT song. Maybe the pass is in there

PostPosted: Tue Aug 03, 2004 5:53 pm
 Back to top 
SpghEddy
Veteran


Joined: 24 Jul 2004
Posts: 88

Could someone try TURTLE or TURTLE POWER as the password?

Also, do all the variants of bee2_maragaretphoto.jpg have a high stegdetect rating, or is it just the uncorrupted variant?

PostPosted: Tue Aug 03, 2004 11:03 pm
 View user's profile
 Back to top 
Benno
Kilroy

Joined: 04 Aug 2004
Posts: 2

Just an idea, because we are dealing with bungie, there is a more-than- outside chance that the passphrase would be seven words long (maybe 7 characters, but i think it would be a phrase).
Also, I think clues to the phrase could be hidden in the text from the corrupted bee2_margaretphoto pictures, i know this text is for "the widow's journey" story, but the snippet

"To mend the queen's cuts the Widow took her sharp knife and / peeled skin from the bodies of her subjects, while the Queen's / new eyes and ears she cut from those who had been / her most trusted servants."

could be a bit of a clue. It comes from the corrupted images.

Also from the operators monologue:

"...the long elegance of a fine decrypt, where you pull noise aside like the flesh of a cooked trout to reveal the gleaming skeleton of signal inside. Very often it's a spill of /// words."

there are references to skin/flesh, ears/noise. Maybe I'm clutching at straws because I can't see a huge connection but I'm not the best at this sorta stuff.
Maybe there is something in the html on the index page, I think that the clue would be located near the puzzle, otherwise it would be way too hard to solve (not that it isn't hard enough!).

I'm new at this stuff, so go easy on flaming. I did try a search before I posted (albeit a quick one)

PostPosted: Wed Aug 04, 2004 1:03 am
 View user's profile
 Back to top 
Display posts from previous:   Sort by:   
Page 10 of 11 [160 Posts]   Goto page: Previous 1, 2, 3, ..., 8, 9, 10, 11  Next
View previous topicView next topic
 Forum index » Archive » Archive: The Haunted Apiary (Let Op!) » The Haunted Apiary (Let Op!): Puzzles
Jump to:  

You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You can download files in this forum
You cannot post calendar events in this forum



Powered by phpBB © 2001, 2005 phpBB Group