Anonymous ID: 0146c4 Aug. 1, 2018, 11:05 p.m. No.2407136   🗄️.is 🔗kun

>>2405387

It's weird how similar the filenames are to the stringers, no idea if they encoded the passwords this way, but it's possible. How else would DS operators share passwords? and if they could share passwords why not share messages that way? why F5?

Anonymous ID: 0146c4 Aug. 2, 2018, 12:13 p.m. No.2414834   🗄️.is 🔗kun   >>6423

>>2412101

>https://boards.4chan.org/pol/thread/180896139

steg detect was positive, these aren't following the filename formats though, i think they are changing password exchange up.

Anonymous ID: 0146c4 Aug. 2, 2018, 2:39 p.m. No.2417299   🗄️.is 🔗kun   >>8536

>>2417121

I think this is the case. The photos of the letter 'Q' for example only partially worked when I was looking at these last night. avenger.jpg didn't work but GreatAwakening.jpeg still did. maybe it missed the .jpeg extensions..

 

>>2416423

Interesting, I'm starting to think the filenames are a result of tooling or cache systems rather than being an autokey cipher of sorts. Back to the drawing board I guess. Maybe Q will help us out later with the 'key'.

Anonymous ID: 0146c4 Aug. 4, 2018, 7:32 p.m. No.2457804   🗄️.is 🔗kun   >>3526

Does anybody have more details on the underlying implementation of SecureRandom? Depending on the psuedo random number generator we may be able to reduce the search space to the possible values of the seed (ex, 0 to maxint).

Anonymous ID: 0146c4 Aug. 5, 2018, 6:42 a.m. No.2463119   🗄️.is 🔗kun   >>3526

>>2427826

Did you just realize the same attack vector I did? There a way we can group up outside public space? Here's a quick rundown, use your key.

 

https://pastebin.com/DP7avPrx

Anonymous ID: 0146c4 Aug. 5, 2018, 7:37 a.m. No.2463615   🗄️.is 🔗kun   >>3782

>>2463526

Thanks for the reply. I noticed the message byte XOR with a random byte after the fact, so yea I don't think we can reconstruct the first steps of 'the map'. If we are to take the brute force approach tho, I would suggest we patch F5.jar to short circuit if the first message byte doesn't come out as expected. We can also make it retry different passwords without reloading too to save some more time (instead of decompressing the image over and over again, reading disk, etc). Just some ideas.

Anonymous ID: 0146c4 Aug. 5, 2018, 5:50 p.m. No.2472406   🗄️.is 🔗kun   >>9397

>>2469295

The [1] is new actually. When I first pulled the file it was not there. Only after 'scrubpocalypse' last teusday evening did I look again and saw [1] added on the chan archives. Was strange.

Anonymous ID: 0146c4 Aug. 6, 2018, 8:53 a.m. No.2479932   🗄️.is 🔗kun

>>2479397

I mean that it wasn't one on the archives before Tuesday. They CHANGED the archives. PixelKnot adds '_#' for conflicting filenames, so it wasn't from that. I literally downloaded a steg'd version from the archive without the [1]. plz no gaslight.

Anonymous ID: 0146c4 Aug. 6, 2018, 11:27 a.m. No.2482058   🗄️.is 🔗kun   >>2651 >>0756

Heads UP, they may be changing the stego in their comms:

https://boards.4chan.org/pol/thread/181352394

https://boards.4chan.org/pol/thread/181366397

Filenames have a funny ~2 at the end, ironically they re-used the photo from a previously identified stego in their 'screenshot'.

Anonymous ID: 0146c4 Aug. 6, 2018, 12:06 p.m. No.2482651   🗄️.is 🔗kun

>>2482058

another one:

https://boards.4chan.org/pol/thread/181352041

 

https://boards.4chan.org/pol/thread/181367598

 

$ md5sum 1533557639424.png

9f4a2a5c8b07b183e2de8fd4908c77aa 1533557639424.png

$ md5sum 1533557639424~2.png

1831a96086323b3994c9caa924467cb4 1533557639424~2.png

 

The ~2 may actually be the chan's way of handling duplicate filenames.. odd the md5s are different however. saw something said something.

Anonymous ID: 0146c4 Aug. 6, 2018, 10:42 p.m. No.2492592   🗄️.is 🔗kun

>>2490855

failed to confirm, avatar.jpg still doesn't extract correctly when fetching uncached with ?blablabla.

 

>>2491957

did you post the password somewhere for that photo? I can run a test on my end to confirm.