Hacker Newsnew | past | comments | ask | show | jobs | submit | c0wb0yc0d3r's favoriteslogin

As many have figured out, these are pre-generated mp4 files. There's no 'magic' in the video files themselves (i.e. the video is not generated on the fly)

In https://thechoiceisyours.whatisthematrix.com/_nuxt/commons/a...

The client side generates an unobfuscated string such as:

red-a-b1-c1435-d-e2-f-g3-h2-i

where 1435 is the current local time (search for `key: "teaserSrcProps"` in the code to find the relevant function)

Then "17" is prepended to that string ("BOND_OBFUSCATION_SALT" in the source code), and then the video file name is simply the MD5 of the string.

To find the video URL:

    // change 1435 for any HHMM time
    timeStr = "red-a-b1-c1435-d-e2-f-g3-h2-i"
    videoFile = MD5("17" + timeStr) + ".mp4"
    url = "https://thechoiceisyours.whatisthematrix.com/generated/v7/high/" + videoFile
:-)

---

All 1440 red pill video URLs (tested all of them in bulk without downloading any using `wget --spider -i allurls.txt` — spider is a cool option!):

https://gist.github.com/gregsadetsky/cb4754d123f0ea1eae26820...


If you upload a pdf to google drive and download it 10 minutes later it will magically have BY FAR the best OCR results in the pdf. Note my pdf tests were fairly clean so your experience may not be the same.

I have used Google's fine OCR results to simulate a hacker.

- Download a youtube video that shows how to attack a server on the website hackthebox.eu

- Run ffmpeg to convert the video to images.

- Run a jpeg to pdf tool.

- Upload the pdf to google drive.

- Download the pdf from google drive.

- Grep for the command line identifiers "$" "#".

- Connect to hackthebox.eu vpn.

- Attack the same machine in the video.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: