THOTCON 0x1 Puzzle • About Ⓘ

Hello! I'm David Schuetz.
This is where I ramble about...stuff.

THOTCON 0x1 Puzzle

So on April 23rd, while I was waiting for the QuahogCon puzzle to post, over in Chicago THOTCON was starting. And a few days later, I saw a tweet from @sak3bomb saying:

I am sad that no one found any of the links I hid in the #thotcon program. Maybe next year...

My immediate response was to ask “There’s a puzzle?” He replied that he wanted to give the attendees from the conference a couple more days, then on April 30th, the program was posted to the THOTCON site. I kind of glanced at it, saw a few URLs hidden in the front page ASCII art, and forgot about it (as I had a trip coming up and had to prepare).

On May 4, he tweeted that the challenge was live. And that there was a prize. I guess I hadn’t realized it was a full-out challenge. Damn. And here I was, thousands of miles from home, with only a new iPad and a laptop with BackTrack3 on a CD (no hard drive) (long story). Could I do this? Well, I guess I’d better try.

So I checked into my hotel room, grabbed the iPad, and went out to dinner. While there I sort of skimmed the program again, figured out what I was up against, and formulated some next steps in my mind. I got back to the hotel, and started in earnest.

If you’d like to try to solve this for yourself, then **STOP** reading now. The rest is full of spoilers. As of right now, the contest is still online. Start by grabbing the THOTCON program. I may try and figure out how to archive all the needed bits later.

The inside of the program had some QR codes. I didn’t really relish the idea of finding the right apps to install on BT to be able to cut them out and then send them to an online QR reader, so I sort of crossed my fingers and hoped they wouldn’t be pertinent to the puzzle. And instead, I focused on the big ASCII art on the front page. Embedded in that were the following strings:

One of these (I’m not gonna say which one! :) ) is a RickRoll. I closely watched the entire video, just to be sure there wasn’t a clue spliced in the middle. Never actually sat through the whole thing before. Another resolved to a Yahoo! address that didn’t give me anything other than an error. But the address looked intriguing. Clicking on that gives the following text:

HAX? I should learn to spell.


That’s a big string of hexadecimal numbers, which when decoded, gives this:


Now we’ve got a base-64 string. Just like the hex string, Google finds an online decoder pronto, and I find this:

At that URL is a very simple page with a single link:

Don't be so audacious, enjoy the music.

Standing - VNV Nation

So far, it’s gone pretty fast, but at this point I hit my first roadblock. The link is to a file called, simply, “standing,” with no extension. But it has a title attribute (seen when you hover the mouse over the link) of “WAV”, so it’s obviously a sound file. My browser refuses to play it. At this point, I gotta give up on the iPad and boot up BackTrack. Downloading it, I see that it’s actually an MP3 file, and so I listen to it. Just like the RickRoll video, I endure the entire clip (actually, this wasn’t too bad). At the very end of the song was a short burst of high-frequency noise.

Armed with basic command-line utilities on BT like sox and such, I cut out the last couple of seconds, and slow them down to about 20% of normal speed. I can barely make out a voice, possibly computer generated, reciting a new URL:

Ah. The plot thickens.

The browser finds itself pointed at the new page, and I see three pictures: Iron Man, the Star Wars cast, and a Dalek. All made to look steampunk. Very cool stuff, actually.

Pretty quickly, all the images were downloaded, and hit with the strings command to look for hidden text. After the image data in ironman.jpg is:

At least you are looking...

and after the data in starwars.jpg is:

If I were you, I would look for a 4th image ;-)

There’s nothing at the end of the dalek.jpg image. However, near the beginning of that file, in a JPEG comment field, is the word:


So now I’ve got a pretty strong incentive to look for a 4th image. I’m not sure what the dec0de text means – maybe it’s significant, maybe it’s not. I look up the source on the web page, and find a 4th image listed after a couple screenfuls of blank lines. It’s got a “display=none” attribute so the browser won’t show it. I download that image and look at it.

It’s actually a funny picture – sort of a rook/castle looking thing, but with a big door and windows. The way it’s rotated, it looks like it’s got a wide-open mouth and is screaming. Or maybe that’s just a side effect of the caption, which reads, simply, “AAAAAAAAAAAAAHHHHH!!” I’m not sure. Either way, there’s nothing that I can find in the image file. No extra data, no comments, no useful EXIF data, etc. I did find the original (or another copy) of the image online, and the file was definitely different, so perhaps it’s been modified for the contest. Or perhaps Sak3bomb just used a different source. Hard to say.


So my first thought is that maybe there’s some kind of steganographic hidden message in the last picture. Or maybe it’s hidden in dalek (and that’s the actual “4th image,” while AHH.jpg is just a red herring.) (arguing in favor of this is the fact that this 4th one isn’t steampunk, and can really be viewed as a visual expression of my frustration at this point of the game.) I search some for JPEG stego tools, and find a bunch of different tools (like jphide and jsteg). But most of them are pretty old. And none of them give me anything useful, though I try the tools against all four images, using no password, “dec0de,” “AAAAAAAAAAAAAHHHHH!!”, and other such words. Nada. Zip. Zilch.

It’s late, so I go to bed and put it off until the next evening.  I have a little back-and-forth with Sak3bomb via twitter direct messages, but don’t really get much that’s helpful. Though eventually the conversation does confirm in my mind that, yes, there’s some kind of steganography going on here. Further searching eventually gets me the tool StegHide. But it’s a Windows application. I try running it under Wine, but I’m missing some key DLLs. I find those DLLs, and extract an installer. Which then installs the DLLs. Which then, finally, lets me run the app. Dammit, for all this work, this better be the right one.

And, yes. It is. Using the password “dec0de” against AHH.jpg gives me a bunch of odd-looking binary data. Trying it with a different password gives an error message – so instead of getting essentially random binary data, like the other apps gave me, I’m getting some confirmation right out of the gate that I’ve found the right tool. And I can trust the data I got to be the next stage.

But what does this data mean? Here are the contents of the file, seen in a classic hex dump view:

0000000: eff1 feee f1fe eef0 feee f1ee eee0 fefe
0000010: f1ee eef0 eeef e0ee eef0 fefe e0ee eff0
0000020: eeef f0fe eef0 eefe f0ef fef1 eeef e0ee
0000030: fef1 eeee f0fe eff1 effe f1ef fef1 eeee
0000040: f0fe eef1 efef f1ee fef0 eeee e0fe fef0
0000050: eeef f0fe eff1 effe f0ef eee0 fefe f0ef
0000060: fef0 efee f0fe eef1 eeee e0ee eff0 eeef
0000070: f0fe fee0 eeee f0fe eef1 feef f0ef fef0
0000080: feef f0ee eee0 efef f1fe eff1 feef f0ee
0000090: eee0 eeee f0ee fef0 effe f1ee eef1 feee
00000a0: f1ee eff0 effe f1ee eef0 feef f0ef efe0
00000b0: fefe e0fe eff0 eeef f0fe eff0 eefe f0fe
00000c0: eef0 eeef e0ef eef0 efee e0ef eee0 eeee
00000d0: f1fe eef1 eeee e0ee eff0 eefe

Looking at the text with strings, or cat, or anything else, just shows me a bunch of extended Latin characters. My first thought was that this is a bitstream to create a picture. I write up some tools to spit it out, in ASCII, at varying resolutions. There are 220 characters of 8 bits each, so that means 1760 pixels total. That can be, obviously, 1760x1, or 880x2, 440x4, 220x8, etc., etc. Lots of possible ways to slice it. And it can be mapped out left-to-right, row-by-row, or top-to-bottom in columns, or maybe across then down one character at a time. Everything I try just doesn’t quite work. I can barely see numbers forming, lots of 3s and 9s and such, but nothing that quite looks actually readable. At this point, everything, not just the ASCII output, looks blurred, and I notice it’s after midnight. Damn. I feel like I’m so close, too!

The next morning, I write down some notes that I can sneak looks at while at work. And one of the first conclusions I come to is that I wasted at least a couple hours trying to force this into a picture – there simply isn’t enough information here to be a picture. For one thing, there are only 6 values used throughout the entire message: e0, ee, ef, f0, f1, and fe. But I really don’t have much chance to look at it during the day, and it’s put on hold until I get back to the hotel.

Once back in my room, I try and look a little closer for other hints. Maybe the bits spell out Morse code – “E” being “1110” could be a dash followed by a dot…etc… But, no, that doesn’t really work out either. Again, not enough information. But there’s definitely something about threes here – the first byte of each 3-byte block seems to always be ee, ef, or fe, and the 2nd byte seems to always be e0, f0, or f1. The stego key had three bytes, and was conveniently a hex string as well. So I try doing a bitwise exclusive or using dec0de as the key, scribbling it by hand on paper. And I see this:

ef f1 fe
ee f1 fe

turn into this:

1 1 <space>
0 1 <space>

Damn, that looks like I’m onto something! Okay, this is too much to do by hand (and I’ll probably screw it up at some key point), so let’s write a script. The output, once I turn multiple consecutive spaces into line endings, looks like this:

11 01 00 0100
100001 000
010010 000 01 101 0 1000 111 11 1000 011110 000
0010 111 010
01 0100 0100 010010
000 01 101 0 1000 111 11 1000 0000 01 1001 010101 1000 1011
10010 100 0 0001 10010 10 001 0100 0100

The extra spaces within each block of numbers tell me this can’t be binary. But could it be Morse code after all? I try assuming that 1s are dots and 0s are dashes, and get “INMY” for the first “word,” but then the rest of it quickly turns into mush. Okay, switch it around: 0 is a dot, 1 is a dash. That produces:

"sakebomb's for all"

Wow. Okay, the mail address is wrong… Not sure if that’s a bug or if I’ve messed up in the decode. I’m going to assume it’s really “sakebomb [at]” and now my completed result is this:

mail -s "sakebomb's for all" sakebomb[at] /dev/null

Normally, I’d just pop open a terminal window and run that. But I’m on BackTrack, and don’t really have a mail server. So I log into webmail and send a “Hope I got this right” email to sakebomb with “sakebomb’s for all” as the subject. And then I get worried, that maybe this is some kind of auto-response server that’s actually looking for a completely blank email, and send a blank message as well. Finally, at 5:58 (my time), while hitting refresh to see if another clue got mailed back to me, @sak3bomb tweets that I’ve just won the contest. W00t!!

This makes the fourth major puzzle I’ve solved so far this year. And I think that, of those four, it’s the most complicated. Perhaps not the most difficult, cryptologically, though the steganography bit was very tough to crack. It was pretty obvious that the “dec0de” string could be used as a password, but the problem is that there are literally thousands of ways that one could encode data inside a JPEG image. It was only through sheer perseverance that I finally found the right tool to extract that data. And then it was a bit of a leap to get the XOR working, especially after some hours trying to force it into a bitmap, and another leap to Morse Code (not as big a jump since I’d already wondered about Morse anyway). Though it was harder than most, it did have one very important thing going for it: multiple clear stages. It really helped to be able to say “Okay, got this part, what’s next?” without worrying that an early mistake could ruin future progress.

So, let’s sum up the solution:

Stage 1:

Stage 2:

Stage 3:

Stage 4:

Stage 5:

The first two stages went pretty fast, possibly less than an hour (I didn’t record times in my notes). I spent another couple hours on Stage 3, and then maybe another hour the next evening. That second evening I spent about three hours fighting with Stage 4. Then on Thursday, maybe an hour to find the right solution to Stage 4, decode it in Stage 5, and win the contest.

What did I win here? Well, I don’t know. There’s some sort of prize, but it’s going to be a couple of weeks before it gets to me. I’ll update the post when I find out. :)

Thanks again to @sak3bomb for a great puzzle!!


(view Archived Comments from the old site)