Aprils fool 2014

Preview:

Citation preview

بیژن ابراهیم»گروه کاربران لینوکس مشهد«عضو

MashhadLUG.org

@bijan@quitter.se

۲۰۱۴دروغ اول آوریل

“April 1st 2014, the aftermath”

گروه کاربران لینوکس مشهد

Apr 01 15:36:46 (IRST)

Freenode[Global Notice] For purely non-profit reasons, all your nickserv accounts have been converted into freenode+ accounts; details at http://blog.freenode.net/2014/04/googleplusfreenode/. Thank you for using freenode.

http://blog.freenode.net/2014/04/googleplusfreenode/

دروغ اول آوریل“April's Fool”

http://blog.freenode.net/2014/04/googleplusfreenode/

“base64”

Binary to Text encodingThe '==' sequence indicates that the last group contained only one byte, and '=' indicates that it contained two bytes.

$ echo “IyMjeGtjZCM=” | base64 -d####xkcd

IyMjeGtjZCM=

####XKCD

Welcome to Level 1!Clue: Tnl2cHItbmFxLU9iby1qbnl4LXZhZ2Itbi1vbmU= All channels in future follow the same pattern of having four (4) #.

$ ciphertext = “Tnl2cHI...Z2Itbi1vbmU=”$ echo $ciphertext | base64 -dNyvpr-naq-Obo-jnyx-vagb-n-one$

####XKCD

“ROT 13”

substitution cipherROT13 is a simple letter substitution cipher that replaces a letter with the letter 13 letters after it in the alphabet.

$ ciphertext = “Tnl2cHI...Z2Itbi1vbmU=”$ echo $ciphertext | base64 -dNyvpr-naq-Obo-jnyx-vagb-n-one$ alias rot13="tr a-zA-Z n-za-mN-ZA-M"$ echo “Nyvpr-naq-Obo-jnyx-vagb-n-one” | rot13Alice-and-Bob-walk-into-a-bar$

####XKCD

####Alice-and-Bob-walk-into-a-bar

Welcome to Level 2!Clue: MKWkpKMa

$ ciphertext = “MKWkpKMa”$ echo $ciphertext | rot13| base64 -d | rot13reddit$

####Alice-and-Bob-walk-into-a-bar

####reddit

Welcome to Level 3!

Clue: Shg5RkR4SUpIeHFGSnlXVUlJSVFJeHFKCg==4 decodes needed

$ ciphertext = “Shg5RkR4SU...SVFJeHFKCg==”$ echo ciphertext | base64 -d | rot13 | base64 -d | rot13EBEORIETEMETHHPITI$

####reddit

EBEORIETEMETHHPITI

“EBEORIETEMETHHPITI”

Zodiac KillerThe Zodiac Killer was a serial killer who operated in northern California in the late 1960s and early 1970s. The killer's identity remains unknown.

####zodiac

Welcome to Level 4!

LaTeX right direction | Google! | No maths needed

“LaTeX”

LaTeXLaTeX is a document preparation system and document markup language. It is the de facto standard for the communication and publication of scientific documents in many fields.

$ echo -E "-\\nabla\\cdot Q_s = \\varepsilon_o\\frac{\\partial\\eta}{\\partial t}" >> formula.tex$ tex2im formula1.tex$ feh formula1.png

####reddit

-\nabla\cdot Q_s = \varepsilon_o\frac{\partial\eta}

{\partial t}

####exner

Welcome to Level 5!

Save this for a later level

$ strings SandvWX.gif####Kolmogorovterrible_small_logo.pngUTsecret.txtUTVA3Sux$ grep -iao "#\{4\}[a-z]\+" SandvWX.gif####Kolmogorov

####Exner

“Steganography”

SteganographySteganography is the art or practice of concealing a message, image, or file within another message, image, or file

$ ls1.jpg 2.jpg secret.txt$ cat 1.jpg secret.txt 2.jpg > big.jpg$ grep -ai “secret message” big.jpgThis is the Secret Message hidden!$

Simple Steganography in Linux

+ Secret + =

“Magic Number (Programming)”

Magic numberMagic numbers implement strongly typed data and are a form of in-band signaling to the controlling program that reads the data type(s) at program run-time. Many files have such constants that identify the contained data.

$ od -N 4 -t x1 1.jpg0000000 ff d8 ff e0$ bless big.jpg

Bless, GNU/Linux

####Kolmogorov

Welcome to Level 6!

Clue: https://dropbox.com/s/emz7...9ivxe/wat.unknown

$ file wat.unknown wat.unknown: JPEG image data, JFIF standard 1.01$ mv wat.unknown wat.jpg$

####Kolmogorov

Wat.jpg

$ strings wat.unknown$ grep -aio ".\+\.[a-z]\{3\}" wat.unknown...pB.Ifatwo.tar.gzU$ 7z e wat.unknown$ tar zxvf two.tar.gzsurprise.txtra.jpg$ cat surprise.txt####ImSoMetaEvenThisAcronym

####Kolmogorov

# apt-get install outguess$ outguess -k "key" -d hidden.txt monkey.jpg out.jpg

Steganography, GNU/Linux

$ outguess -k "key" -r out.jpg message.txt

# apt-get install outguess$ outguess -k "key" -d hidden.txt monkey.jpg out.jpg

####ImSoMetaEvenThisAcronym

Welcome to Level 7!

Clue: AqwPfPN1Z...fVQYPfPNlZBXNfvNkAP4jZhXNflOS and "Da Vinci" | Jules Verne

$ ciphertext=”AQwPfPN1ZXNf...PlZBXNfvNkAP4jZhXNflOS”$ echo $ciphertext | rot13 | base64 -d48° 50 0 N, 2° 20 14.02 E′ ″ ′ ″

####ImSoMetaEvenThisAcronym

“48° 50′ 0″ N, 2° 20′ 14.02″ E”

Paris meridianThe Paris meridian is a meridian line running through the Paris Observatory in Paris, France—now longitude 2°20′14.03″ east.

Paris meridian

Rosslyn Chapel's entrance was more modest than Langdon expected. The small wooden door had two iron hinges and a simple oak sign, Roslin.

Main ArticleRose Line

Dan Brow'The Da Vinci Code

####RoslinWelcome to Level 8!

Clue: UIVXUJZIULMJCAGLKHKTOLUPSRDD

Playfair Playfair1 key needed 1 key needed

Two-Square Two-Square2 key needed Possible Cipher

Four-Square Four-Square2 key needed The Cipher

####Roslin

$ python>> from pycipher import Foursquare>> from string import letters>> from collections import OrderedDict>> def uniq(key): return "".join(OrderedDict.fromkeys(key))>> key1 = uniq('IRC'+letters[26:]).replace('Q', '')>> key2 = uniq('XKCD'+letters[26:]).replace('Q', '')>> fsqr = Foursquare(key1, key2)>> fsqr.alpha = letters[26:].replace('Q', '')>> fsqr.decipher('UIVXUJZIULMJCAGLKHKTOLUPSRDD')'POVAROVOSOLNECHNOGORSKRUSSIA'>>

####PovarovoSolnechnogorskRussiaWelcome to Level 9!

Clue: OGUCSSGAPVGVLUMBTVOGICUNJDHSTB | RUTJJGNXUNTY

Letters that would repeat in a typical word do not repeat in the key(s), example 'freenode' would be

'frenod'

“PovarovoSolnechnogorskRussia”

Povarovo, Moscow OblastPovarovo is an urban locality in Solnechnogorsky District of Moscow Oblast, Russia. located 30 kilometers (19 miles) from the federal city of Moscow. The UVB-76 radio transmitter was thought to be located near Povarovo.

“PovarovoSolnechnogorskRussia”

Povarovo, Moscow OblastPovarovo is an urban locality in Solnechnogorsky District of Moscow Oblast, Russia. located 30 kilometers (19 miles) from the federal city of Moscow. The UVB-76 radio transmitter was thought to be located near Povarovo.

“The UVB-76 transmitter”

UVB-76UVB-76, also known as The Buzzer, is the nickname given by radio listeners to a shortwave radio station that broadcasts on the frequency 4625 kHz. It has been active since at least the late 1970s or early 1980s.

####PovarovoSolnechnogorskRussia

$ python>> from pycipher import Foursquare>> from string import letters>> from collections import OrderedDict>> def uniq(key): return ''.join(OrderedDict.fromkeys(key))>> key1 = uniq('RUSSIA'+letters[26:]).replace('Q', '')>> key2 = uniq('UVB'+letters[26:]).replace('Q', '')>> fsqr = Foursquare(key1, key2)>> fsqr.alpha = letters[26:].replace('Q', '')>> fsqr.decipher('RUTJJGNXUNTY')'AARONHSWARTZ'>>

####AaronHSwartzWelcome to Level 10!

Clue: HKGJSUOJVRLGSBEL...RURWMGTUGJGWTKN

“Aaron H.Swartz”

Aaron SwartzAaron Hillel Swartz (November 8, 1986 – January 11, 2013) was an American computer programmer, writer, political organizer and Internet activist.

####AaronHSwartzAaron H.Swartz

DeveloperRSS (web feed)

Creative Commonsweb.py (website framework)

W3C (RDF-Core working group)

Authored / Co-creatorInfogami (Merged with Reddit)Tor2web (HTTP proxy for Tor)

MarkdownWikipedia

####AaronHSwartzAaron H.Swartz

ActivismWatchdog.net (the good government site with teeth)

Progressive Change Campaign CommitteeDemand Progress

Campaign against the SOPA

####AaronHSwartzAaron H.Swartz

RIPNovember 8, 1986 - January 11, 2013

(aged 26)

Demand Progress

####AaronHSwartz

$ python>> from pycipher import Foursquare>> from string import letters>> from collections import OrderedDict>> def uniq(key): Return ''.join(OrderedDict.fromkeys(key))>> key_1 = 'DEMAND'>> key_2 = 'PROGRESS'>> key1 = uniq(key_1+letters[26:]).replace('Q', '')>> key2 = uniq(key_2+letters[26:]).replace('Q', '')>> fs = Foursquare(key1, key2)>> fs.alpha = letters[26:].replace('Q', '')>> fs.decipher('HKGJSUOJVRLGSBE...RWMGTUGJGWTKN')'JOINUSNOWANDSHARETHESOFTWAREWRITTENBYRMS'>>

####JOINUSNOWANDSHARETHESOFTWAREWRITTENBYRMS

JOIN US NOW AND SHARE THE SOFTWARE WRITTEN BY RMS

Congratulations on solving the freenode's April Fools 2014 Crypto Challenge

1. booto 2. furry 3. mniip 4. jojo 5. redi 6. BlueShark 7. larinadavid 8. Omniflux 9. apoc10. thommey11. knivey12. Tordek

13. jacob114. stac15. Changaco16. Arch-TK17. ar18. Weetos19. lyoko120. vi[NLR]21. tkd22. Chiyo23. slidercrank24. jojoa1997

25. Pixelz26. Transfusion27. DonkeyHotei28. sdamashek29. Cypi30. FXOR31. pad32. skasturi33. Bloodhound34. molly35. Bijan-E

Appril's fool 2014Winners List

Top ten winnersCloak lottery winners

تا دروغ آوریل بعدی“Till the next April's fool”

@bijan@quitter.se