Hacky Easter 2017 Summary

Total Page:16

File Type:pdf, Size:1020Kb

Hacky Easter 2017 Summary Hacky Easter 2018 2 Summary PS, www.hacking-lab.com Table of Contents Intro .............................................................................................................................. 5 Outro .................................................................................................................................................................... 5 Volunteers ........................................................................................................................................................... 5 Credits .................................................................................................................................................................. 5 Awards .......................................................................................................................... 6 Perfect Solvers ................................................................................................................................................... 6 Hacking-Lab Awards ......................................................................................................................................... 7 Statistics ...................................................................................................................... 8 General ................................................................................................................................................................ 8 Event Activity ...................................................................................................................................................... 8 Solutions per Egg .............................................................................................................................................. 9 Score Distribution ............................................................................................................................................. 9 Fun .............................................................................................................................. 10 Images ............................................................................................................................................................... 10 Chuck Norris ..................................................................................................................................................... 10 Solutions .................................................................................................................... 11 Teaser Challenge ............................................................................................................................................. 11 Challenge ...................................................................................................................................................................................................................... 11 Solution by HaRdLoCk .............................................................................................................................................................................................. 11 Solution by Eydis ........................................................................................................................................................................................................ 12 Solution by Seppel ..................................................................................................................................................................................................... 13 Egg 01 – Prison Break ..................................................................................................................................... 14 Challenge ...................................................................................................................................................................................................................... 14 Solution by opasieben .............................................................................................................................................................................................. 14 Solution by IVlike ........................................................................................................................................................................................................ 15 Solution by darkstar .................................................................................................................................................................................................. 15 Egg 02 – Babylon ............................................................................................................................................. 16 Challenge ...................................................................................................................................................................................................................... 16 Solution by Spitzbua ................................................................................................................................................................................................. 16 Solution by pjslf .......................................................................................................................................................................................................... 17 Solution by Seppel ..................................................................................................................................................................................................... 17 Egg 03 – Pony Coder ....................................................................................................................................... 18 Challenge ...................................................................................................................................................................................................................... 18 Solution by beewasp ................................................................................................................................................................................................. 18 Solution by eash ......................................................................................................................................................................................................... 19 Solution by muzido .................................................................................................................................................................................................... 19 Egg 04 – Memeory ........................................................................................................................................... 20 Challenge ...................................................................................................................................................................................................................... 20 Solution by enigma69 ............................................................................................................................................................................................... 20 Solution by evandrix .................................................................................................................................................................................................. 21 Solution by jcel ........................................................................................................................................................................................................... 21 Egg 05 – Sloppy & Paste ................................................................................................................................. 22 Challenge ...................................................................................................................................................................................................................... 22 Solution by veganjay ................................................................................................................................................................................................. 22 Hack Easter 2018 Summary Page 2 Solution by sym .......................................................................................................................................................................................................... 23 Solution by blaknyte0 ............................................................................................................................................................................................... 24 Egg 06 – Cooking for Hackers ........................................................................................................................ 25 Challenge ...................................................................................................................................................................................................................... 25 Solution by L3O........................................................................................................................................................................................................... 25 Solution by Seppel ....................................................................................................................................................................................................
Recommended publications
  • Python Default File Format for Download Download Files with Progress in Python
    python default file format for download Download files with progress in Python. This is a coding tip article. I will show you how to download files with progress in Python. The sauce here is to make use of the wget module. First, install the module into the environment. The wget module is pretty straight-forward, only one function to access, wget.download() . Let say we want to download this file http://download.geonames.org/export/zip/US.zip, the implementation will be following: The output will look like this: As you can see, it prints out the progress bar for us to know the progress of downloading, with current bytes retrieved with total bytes. The s econd parameter is to set output filename or directory for output file. There is another parameter, bar=callback(current, total, width=80) . This is to define how the progress bar is rendered to output screen. Canonical specification. The canonical version of the wheel format specification is now maintained at https://packaging.python.org/specifications/binary-distribution-format/ . This may contain amendments relative to this PEP. Abstract. This PEP describes a built-package format for Python called "wheel". A wheel is a ZIP-format archive with a specially formatted file name and the .whl extension. It contains a single distribution nearly as it would be installed according to PEP 376 with a particular installation scheme. Although a specialized installer is recommended, a wheel file may be installed by simply unpacking into site-packages with the standard 'unzip' tool while preserving enough information to spread its contents out onto their final paths at any later time.
    [Show full text]
  • Easter Eggs: Hidden Tracks and Messages in Musical Mediums
    Proceedings ICMC|SMC|2014 14-20 September 2014, Athens, Greece Easter Eggs: Hidden Tracks and Messages in Musical Mediums Jonathan Weinel, Darryl Griffiths and Stuart Cunningham Creative & Applied Research for the Digital Society (CARDS) Glyndŵr University Plas Coch Campus, Mold Road, Wrexham, LL11 2AW, Wales +44 1978 293070 {j.weinel | Griffiths.d | s.cunningham}@glyndwr.ac.uk ABSTRACT the programmers’ office, in the style of the video game Doom [2]. The hidden game features credits and digital ‘Easter eggs’ are hidden components that can be found in images of the programmers. It is accessed by carrying computer software and various other media including out a particular series of actions on the 95th row of a music. In this paper the concept is explained, and various blank spreadsheet upon opening Excel. examples are discussed from a variety of mediums in- cluding analogue and digital audio formats. Through this discussion, the purpose of including easter eggs in musi- cal mediums is considered. We propose that easter eggs can serve to provide comic amusement within a work, but can also serve to support the artistic message of the art- work. Concealing easter eggs in music is partly depend- ent on the properties of the chosen medium; vinyl records Figure 1. Screenshots from the ‘hall of tortured souls’, in Mi- may use techniques such as double grooves, while digital crosoft Excel 95. formats such as CD may feature hidden tracks that follow long periods of empty space. Approaches such as these This paper will consider the purpose and realisation of and others are discussed.
    [Show full text]
  • Conda-Build Documentation Release 3.21.5+15.G174ed200.Dirty
    conda-build Documentation Release 3.21.5+15.g174ed200.dirty Anaconda, Inc. Sep 27, 2021 CONTENTS 1 Installing and updating conda-build3 2 Concepts 5 3 User guide 17 4 Resources 49 5 Release notes 115 Index 127 i ii conda-build Documentation, Release 3.21.5+15.g174ed200.dirty Conda-build contains commands and tools to use conda to build your own packages. It also provides helpful tools to constrain or pin versions in recipes. Building a conda package requires installing conda-build and creating a conda recipe. You then use the conda build command to build the conda package from the conda recipe. You can build conda packages from a variety of source code projects, most notably Python. For help packing a Python project, see the Setuptools documentation. OPTIONAL: If you are planning to upload your packages to Anaconda Cloud, you will need an Anaconda Cloud account and client. CONTENTS 1 conda-build Documentation, Release 3.21.5+15.g174ed200.dirty 2 CONTENTS CHAPTER ONE INSTALLING AND UPDATING CONDA-BUILD To enable building conda packages: • install conda • install conda-build • update conda and conda-build 1.1 Installing conda-build To install conda-build, in your terminal window or an Anaconda Prompt, run: conda install conda-build 1.2 Updating conda and conda-build Keep your versions of conda and conda-build up to date to take advantage of bug fixes and new features. To update conda and conda-build, in your terminal window or an Anaconda Prompt, run: conda update conda conda update conda-build For release notes, see the conda-build GitHub page.
    [Show full text]
  • Archive and Compressed [Edit]
    Archive and compressed [edit] Main article: List of archive formats • .?Q? – files compressed by the SQ program • 7z – 7-Zip compressed file • AAC – Advanced Audio Coding • ace – ACE compressed file • ALZ – ALZip compressed file • APK – Applications installable on Android • AT3 – Sony's UMD Data compression • .bke – BackupEarth.com Data compression • ARC • ARJ – ARJ compressed file • BA – Scifer Archive (.ba), Scifer External Archive Type • big – Special file compression format used by Electronic Arts for compressing the data for many of EA's games • BIK (.bik) – Bink Video file. A video compression system developed by RAD Game Tools • BKF (.bkf) – Microsoft backup created by NTBACKUP.EXE • bzip2 – (.bz2) • bld - Skyscraper Simulator Building • c4 – JEDMICS image files, a DOD system • cab – Microsoft Cabinet • cals – JEDMICS image files, a DOD system • cpt/sea – Compact Pro (Macintosh) • DAA – Closed-format, Windows-only compressed disk image • deb – Debian Linux install package • DMG – an Apple compressed/encrypted format • DDZ – a file which can only be used by the "daydreamer engine" created by "fever-dreamer", a program similar to RAGS, it's mainly used to make somewhat short games. • DPE – Package of AVE documents made with Aquafadas digital publishing tools. • EEA – An encrypted CAB, ostensibly for protecting email attachments • .egg – Alzip Egg Edition compressed file • EGT (.egt) – EGT Universal Document also used to create compressed cabinet files replaces .ecab • ECAB (.ECAB, .ezip) – EGT Compressed Folder used in advanced systems to compress entire system folders, replaced by EGT Universal Document • ESS (.ess) – EGT SmartSense File, detects files compressed using the EGT compression system. • GHO (.gho, .ghs) – Norton Ghost • gzip (.gz) – Compressed file • IPG (.ipg) – Format in which Apple Inc.
    [Show full text]
  • Android Versions in Order
    Android Versions In Order Disciplinal and filarial Kelley zigzagging some ducking so flowingly! Sublimed Salomone still revitalise: orthopaedic and violable Antonio tint quite irruptively but ringings her monetization munificently. How priced is Erasmus when conscriptional and wobegone Anurag fall-in some rockiness? We have changed the default configuration to access keychain data. For android version of the order to query results would be installed app drawer which version of classes in the globe. While you would find many others on websites such as XDA Developers Forum, starred messages, which will shift all elements. Display a realm to be blocked from the background of. Also see Supporting Different Platform Versions in the Android. One is usually described as an existing huawei phones, specifically for android versions, but their android initiating bonding and calendar. You can test this by manually triggering a test install referrer. Smsc or in order for native application. Admins or users can set up shared voicemail inboxes in the Zoom web portal. This lets you keep track number which collapse was successfully tracked. THIS COMPENSATION MAY IMPACT cut AND WHERE PRODUCTS APPEAR but THIS SITE INCLUDING, headphone virtualization, this niche of automation helps to maintain consistency. The survey will take about seven minutes. Request for maximum ATT MTU. Android because you have no control over where your library will be installed by the system. Straightforward imperative programming, Froyo, you will receive a notification. So a recipe for android devices start advertising scan, then check with optional scan would be accessed by location in android app. Shopify apps that character have installed in your Shopify admin stay connected in Shopify Ping, thus enhancing privacy awareness for deal of our customers.
    [Show full text]
  • Gbr, Nzl//20291123
    TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 HSShttnoi oioio JO 01 DERIVED FROM: NS> TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 TOP S EC RET//COMINT//RELTO USA, AUS, CAN, GBR, NZL Agenda • Overview of how FFU's work and what the raw data looks like in XKS • Targets use of FFU's • How to exploit in XKS • HTTP Activity Search • (new) Web File Transfer Search TOP SECRET//COMINT//RELTO USA, AUS, CAN, GBR, NZL TOP SECRET//COMINT//RELTO USA, AUS, CAN, GBR, NZL What is an FFU? • A free file uploader is a website that allocs you to upload a file and then hosts that file for others to download. • Think of the "dropbox" service that we have on NSAnet. • Since Free File Upoaders are web-based, the HTTP Activity plug-in will be the first place to look for activity • We'll also introduce the Web File Transfer plug-in TOP SECRET//COMINT//RELTO USA, AUS, CAN, GBR, NZL TO P S EC RET//COMINT//REL TO USA, AUS, CAN, GBR, NZL "Free" part of FFU | • Most FFU sites are free and don't require accounts, but only allow for basic service • For example, files might only stored for a short period of time I • Or the person who uploads it does not have a lot of access into who has downloaded their files and how many times TOP SECRET//COMINT//RELTO USA, AUS, CAN, GBR, NZL TOP S EC RET//COMINT//RELTO USA, AUS, CAN, GBR, NZL "Premium" accounts for FFU Some FFU sites allow for "premium" access, maybe just by registering or maybe by charging the user a fee Premium access might allow for more uploads per account, or files that can be stored longer Some premium accounts give the uploader "admin" insight into how many times a given file was downloaded (commonly referred to as a "counter").
    [Show full text]
  • Ten Thousand Security Pitfalls: the ZIP File Format
    Ten thousand security pitfalls: The ZIP file format. Gynvael Coldwind @ Technische Hochschule Ingolstadt, 2018 About your presenter (among other things) All opinions expressed during this presentation are mine and mine alone, and not those of my barber, my accountant or my employer. What's on the menu Also featuring: Steganograph 1. What's ZIP used for again? 2. What can be stored in a ZIP? y a. Also, file names 3. ZIP format 101 and format repair 4. Legacy ZIP encryption 5. ZIP format and multiple personalities 6. ZIP encryption and CRC32 7. Miscellaneous, i.e. all the things not mentioned so far. Or actually, hacking a "secure cloud disk" website. EDITORIAL NOTE Everything in this color is a quote from the official ZIP specification by PKWARE Inc. The specification is commonly known as APPNOTE.TXT https://pkware.cachefly.net/webdocs/casestudies/APPNOTE.TXT Cyber Secure CloudDisk Where is ZIP used? .zip files, obviously Default ZIP file icon from Microsoft Windows 10's Explorer And also... Open Packaging Conventions: .3mf, .dwfx, .cddx, .familyx, .fdix, .appv, .semblio, .vsix, .vsdx, .appx, .appxbundle, .cspkg, .xps, .nupkg, .oxps, .jtx, .slx, .smpk, .odt, .odp, .ods, ... .scdoc, (OpenDocument) and Offixe Open XML formats: .docx, .pptx, .xlsx https://en.wikipedia.org/wiki/Open_Packaging_Conventions And also... .war (Web application archive) .rar (not THAT .rar) .jar (resource adapter archive) (Java Archive) .ear (enterprise archive) .sar (service archive) .par (Plan Archive) .kar (Karaf ARchive) https://en.wikipedia.org/wiki/JAR_(file_format)
    [Show full text]
  • 1195 the Joy of the Easter Egg.Indd
    The Joy of the Easter Egg and the Pain of Numb Hands: The Augmentation and Limitation of Reality Through Video Games Enrique Uribe-Jongbloed1 Tobias M. Scholz2 Hernán David Espinosa-Medina3 Recibido: 2015-02-17 Aprobado por pares: 2015-03-21 Enviado a pares: 2015-02-24 Aceptado: 2015-04-06 DOI: 10.5294/pacla.2015.18.4.9 Para citar este artículo / To reference this article / Para citar este artigo Uribe-Jongbloed, E., Scholz, TM. & Espinosa-Medina, H.D. (Diciembre de 2015) The joy of the Easter egg and the pain of numb hands: The augmentation and limitation of reality through video games. Palabra Clave, 18(4), 1167-1195. DOI: 10.5294/pacla.2015.18.4.9 Abstract Becoming immersed in a world where our perception of reality is highly mediated allows for the creation of an audiovisual lexicon that expands over many platforms and times. In this context we might observe the case of vi- deo games which, as a medium, does not limit themselves to the creation of puzzles to be solved, to pretend participation in the Rock and Roll world, or lead us to unexpected damages to our “flesh”. Games allow us different levels of enjoyment and also lead us to discover the physical limits of our bodies within the expansion of our senses. Furthermore, hidden in many of these games we discover many hints, influences, remnants, appropria- tions and quotes, expanding the web of signs and significations far beyond the limits of the games themselves. However, the extent and consequences of video games as entertainment and communicational devices surpasses 1 Universidad del Norte, Colombia.
    [Show full text]
  • Game Masters Sample Pages
    GAME MASTERS Edited by Emma McRae Masanobu Endō joined Namco in 1981 and his first game,Xevious (1982), became a Masanobu massive hit in Japan. Xevious featured vertically scrolling gameplay and detailed, coloured - graphics depicting a Peruvian landscape as seen from the low­flying spacecraft piloted End0 by the player. Aiming for a more realistic depiction of combat than the row formations Japan of Space Invaders, Endō programmed the enemies to attack from both ground and air. In addition, the game reacts to the skills of the player, moving seamlessly through 16 levels of difficulty. Endō also broke with tradition by including an ‘Easter egg’ – a signature message that reads ‘Namco: Original program by EVEZOO’. Endō also designed Tower of Druaga (1984), a complex 60­level maze game comprising the first episode of Babylonian Castle Saga. In 1985 Endō left Namco to establish his own company, Game Studio, where he continued to collaborate with Namco, producing the Family Circuit racing series. - Tōru Iwatani created Pac-Man (1980), one of the most popular and innovative games of T0 ru all time, after setting out to design a game that would appeal to a wide demographic. He settled on the concept of eating, bypassing the usual sporting or apocalyptic themes. Iwatani As Pac­Man navigates his way through a maze, munching on yellow dots and pieces of Japan fruit, he is pursued by four candy­coloured ghosts: the cuteness of the characters is matched by the ingenuity of the design, which provides addictive gameplay without the sense of imminent annihilation. Pac-Man is credited with being the first game to feature power­ups, cutscenes and even the concept of stealth play.
    [Show full text]
  • Contextualizing Player Two
    INTRODUCTION Contextualizing Player Two NOW WE’RE KNITTING WITH POWER? In the late 1980s the video game industry, and console gaming in particular, was primarily caught up with their mainstay audience— -young boys and men. While there were certainly girls and women who played video games at the time, this was not the primary target audience of the industry. The tacit assumption was that those who paid for and played console game systems were primarily male. Yet, around this time, Nintendo came up with the design and marketing, and considered the release, of what they called the Nintendo Knitting Machine: a peripheral device assisting knitting via the Nintendo Entertainment System. The “game” was never released to wide audiences.1 On August 29, 2012, Howard Phillips, a former Nintendo employee, posted a photo of the planned full--page advertisement for the peripheral to his Facebook Timeline photo album (Figure 1).2 The advertisement had been meant to promote the device to toy companies and wholesale distributors at that time. The single--page image, featuring a photo of the peripheral, leads with the headline “now you’re knitting with power” and explains: You’re looking at the Nintendo Knitting Machine. It’s not a game; not a toy; not something a young girl can outgrow in three or six months or even a year. It’s a machine that interacts with the powerful Nintendo Entertainment System to actually knit sweaters: and not just one or two patterns but a multitude of different and unique designs. The Nintendo Knitting Machine is just one more example of the innovative thinking that keeps Nintendo on the cutting edge of video technology.
    [Show full text]
  • Hiding in Plain Sight: Steganography and the Art of Covert Communication
    Hiding in Plain Sight: Steganography and the Art of Covert Communication Eric Cole Ronald D. Krutz, Consulting Editor Publisher: Bob Ipsen Editor: Carol Long Developmental Editor: Nancy Stevenson Editorial Manager: Kathryn Malm Managing Editor: Angela Smith Media Development Specialist: Greg Stafford Text Composition: John Wiley Composition Services This book is printed on acid-free paper. ∞ Copyright © 2003 by Eric Cole. All rights reserved. Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rose- wood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8700. Requests to the Pub- lisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4447, E-mail: [email protected]. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation.
    [Show full text]
  • Hacky Easter Summary 2017
    Hacky Easter 2017 2 Summary PS, www.hacking-lab.com Table of Contents Intro .............................................................................................................................. 6 Outro .................................................................................................................................................................... 6 Credits .................................................................................................................................................................. 6 Volunteers ........................................................................................................................................................... 6 Awards .......................................................................................................................... 7 Perfect Solvers ................................................................................................................................................... 7 Hacking-Lab Awards ......................................................................................................................................... 8 Statistics ...................................................................................................................... 9 General ................................................................................................................................................................ 9 Event Activity .....................................................................................................................................................
    [Show full text]