sudo apt install zsh-autosuggestions zsh-syntax-highlighting zsh
| #!/bin/env python3 | |
| import argparse | |
| import datetime | |
| import re | |
| import sys | |
| import uuid | |
| ############################################################################### | |
| # Based off of Daniel Thatcher's guid tool |
| Telerik.Web.UI.WebResource.axd?type=rau | |
| /Telerik.Web.UI.WebResource.axd?type=rau | |
| Telerik.Web.UI.DialogHandler.aspx | |
| /Telerik.Web.UI.DialogHandler.aspx | |
| /Reports/Pages/Folder.aspx | |
| Reports/Pages/Folder.aspx | |
| /cgi-bin/status | |
| cgi-bin/status | |
| swagger-ui.html | |
| swagger/swagger-ui.html |
| _ | |
| ..;/ | |
| @ | |
| 0 | |
| 00 | |
| 01 | |
| 02 | |
| 03 | |
| 04 | |
| 05 |
| (function() { | |
| const copyToClipboard = str => { | |
| const el = document.createElement('textarea'); | |
| el.value = str; | |
| el.setAttribute('readonly', ''); | |
| el.style.position = 'absolute'; | |
| el.style.left = '-9999px'; | |
| document.body.appendChild(el); | |
| el.select(); | |
| document.execCommand('copy'); |
| 0 | |
| 00 | |
| 01 | |
| 02 | |
| 03 | |
| 1 | |
| 1.0 | |
| 10 | |
| 100 | |
| 1000 |
Sort lines alphabetically, if they aren't already, and perform these steps:
(based on this related question: https://stackoverflow.com/q/1573361/3258851)
Control+F
Toggle "Replace mode"
Toggle "Use Regular Expression" (the icon with the .* symbol)
Today (April 16th 2019 at noon) the first major clues to discover key #1 was set to be released in a few cities. A QR code with the words 'orbital' were found at these locations and looked like this: (https://imgur.com/a/6rNmz7T). If you read the QR code with your phone you will be directed to this url: https://satoshistreasure.xyz/k1
At this URL you are prompted to input a passphrase to decrypt the first shard. An obvious first guess was to try the word 'orbital' from the QR code. Not suprisingly this worked! This reveals a congratulations page and presents the first key shard:
ST-0001-a36e904f9431ff6b18079881a20af2b3403b86b4a6bace5f3a6a47e945b95cce937c415bedaad6c86bb86b59f0b1d137442537a8.
Now, we were supposed to wait until April 17th to get clues from the other cities for keys #2 and #3 but that wouldn't stop me from digging around with all the new information we had. All that time "playing" notpron (http://notpron.org/notpron/) years ago was going to help me here.
The first thing I noticed was
| #Tool based on a resolver.rb by @melvinsh | |
| #Original Repository: https://github.com/melvinsh/subresolve | |
| #Modified by @ehsahil for Personal Use. | |
| require 'socket' | |
| require 'colorize' | |
| begin | |
| file = File.open(ARGV[0], "r") | |
| rescue | |
| puts "Usage: ruby recon.rb wordlist" |
| #Tools based on a resolver.rb by @melvinsh | |
| #Repository: https://github.com/melvinsh/subresolve | |
| #Modified by @ehsahil for Personal Use. | |
| require 'socket' | |
| require 'colorize' | |
| begin | |
| domain = ARGV[0] | |
| rescue | |
| puts "Usage: ruby subdomain.rb domain" | |
| exit |