Anonymous ID: 4c30cc Sept. 29, 2018, 1:19 p.m. No.3252084   🗄️.is 🔗kun

Found a version of this image that may be a pixelknot image.

The original image from https:// pbs.twimg.com/media/DoJjUrPUcAATUQD.jpg is not a pixelknot and has a standard JFIF header.

 

Did a reverse image search looking for other sites using that image, and I found a version that has an abnormal header very close to that of a pixelknot header (1 byte off) in this newsday article from 2016 about a Killory fundraiser:

https:// www.newsday.com/long-island/hillary-clinton-holds-33-400-a-head-hamptons-fundraiser-1.12238672

(direct image link: https:// cdn.newsday.com/polopoly_fs/1.12238881.1472525321!/httpImage/image.jpeg_gen/derivatives/landscape_768/image.jpeg)

 

For a pixelknot header, we expect:

First 6 bytes to be: ff d8 ff db 00 84

Also the 4 bytes starting at 0x88 should be: ff c0 00 11

 

The header in the modified image is only off by the 5th byte which is a 43 instead of 84.

 

Have tried the f5.jar with numerous password guesses (strings from that article, Evergreen, Eagle, Renegade, etc.), but haven't gotten lucky. Did anyone ever figure out a way to brute force pixelknot?