throwawaypizzagate | 129 points | Nov 08 2016 22:28:40

on /pol/ recently, password protected area of Comet found

http://www.cometpingpong.com/protected/ Someone please find the password for this, someone had a password and then the thread got deleted super quick. There was a whole bunch of zip files

EDIT: Here was what it looked like http://imgur.com/a/stenG

permalink

klorptar | 59 points | Nov 09 2016 00:09:59

Nothing fishy here. Just huge, PW protected zip files in hidden area of a pizza website.

permalink

[deleted] | 42 points | Nov 09 2016 05:01:09

You need to go farther down the rabbit hole.

Ask yourself, if you were using a legitimate business as a front for selling something highly illegal, how would you go about it?

  1. Code words - use common words for something else: ie, pizza means kids.

  2. Proxy buying - purchase a pizza, leave a large enough tip, get a receipt with an encryption key printed on it. Everyone thinks the number on the receipt is random, but the number is a password. When you get home, fire up your tor browser and download "dessert". As far as transactions go, your credit card bill shows you paid $100 for a night out, but your internet traffic would show you visited the hidden web page and made a download.

The only way to test that theory would be to correspond credit card transactions with web traffic to this website. That sort of thing is best left to alphabet agencies, but they too might be implicated in this and thus reluctant to blow the lid off it.

permalink

ragecry | 13 points | Nov 09 2016 20:08:55

This leaked Stratfor email is pertinent to what you're saying, they are testing a credit card processing system for pizza:

testing the Pizza Pages - your list

Search Wikileaks for "pizza pages" and you'll find more.

permalink

[deleted] | 8 points | Nov 09 2016 20:49:56

This is where Palantir comes in.

https://www.youtube.com/watch?v=dVsx4I8gkKk

There was an entire list of pizza websites emanating from the same domain 50.16.177.65

https://archive.4plebs.org/pol/thread/96542181/

A company is in the business of providing restaurants with a platform for ordering and payment processing. I'm not certain that Comet Ping Pong is part of this payment system. But Besta Pizza (another connected "pizza" joint) is.

https://ordersnapp.com/our-clients

permalink

[deleted] | 3 points | Nov 09 2016 21:33:04

Yup, I saw all those, including the attachment word file where they are doing pizza tests on their online payment system. Also, that "14-Fish" picture of Podesta seems to have been taken in Austin.

Also search Dentist Samuelson - could just be a bunch of clowns talking shit but who knows.

https://wikileaks.org/gifiles/docs/13/13828_re-dentist-scott-samuelson-.html

permalink

Graceful_Ballsack | 3 points | Nov 12 2016 21:14:34

This is sarcasm guys

permalink

Deathoftheages | 33 points | Nov 09 2016 00:26:45

Ok if I had to guess if this at all has to do with the whole pedo ring those zips are going to be child porn and that's why each one has a separate password because they sell them in packs. Probably separated by themes of some sort. I'd suggest not spamming this around. If they get wind they will just disable the page.

permalink

I00PercentFresh | 18 points | Nov 09 2016 10:27:39

Too late

permalink

Phod | 26 points | Nov 09 2016 07:43:33

Lol what restaurant has a password protected area with weird zip files. This is totally CP. anyone know some hackers?

permalink

JangoTheJanitor | 24 points | Nov 09 2016 02:46:13

Someone should index a huge batch of the Podesta emails and run that through a custom dictionary generator like the kind in AccessData's Password Recovery Toolkit, and then run dictionary attacks against the zip file with something like John the Ripper.

permalink

Gem420 | 4 points | Nov 09 2016 23:33:43

If I could I would. Give it a shot, just protect yourself first.

permalink

JangoTheJanitor | 6 points | Nov 10 2016 21:26:45

I'm a cybersecurity professional and digital forensic examiner. I deal with this kind of stuff on the daily, and I'm definitely considering giving it a crack.

permalink

IMLOwl | 1 points | Nov 10 2016 21:55:59

The chances of something like this being able to be dictionaried are extremely slim. File names appear to be ualpha-numeric random and I expect DL keys are also. Brute force time would be billions of years.

permalink

JangoTheJanitor | 2 points | Nov 11 2016 03:14:55

I get where you're coming from but it's at least worth going through the motions. There's nothing to lose from the action, and a personalized dictionary attack technically isn't bruteforcing, but I know what you mean. Podesta's data might not be the most relevant either (Brock or Alefantis would be my first choice) but at this point there's no reason not to try.

On another note, has anybody checked some of the bizarre and seemingly random CPPP social media photographs for steganography? Just a random thought I had.

permalink

Gem420 | 1 points | Nov 11 2016 05:33:53

Good luck. And be very careful!

permalink

Gem420 | 1 points | Nov 11 2016 05:36:30

I spoke with someone who is very knowledgeable and he said this can be cracked, but he won't do it. :( he also confirmed those files are very large and is curious what's in those .txt files...

permalink

Dr_Lovefist | 17 points | Nov 08 2016 23:01:10

Thread http://archive.is/45Lun

permalink

GuygrR_9 | 2 points | Nov 09 2016 21:20:50

Did they crack the Zips yet?

permalink

HillarysPizzaParty | 10 points | Nov 09 2016 02:03:51

If someone were to crack that password, it might yield interesting info.

permalink

goodguy_asshole | 7 points | Nov 09 2016 00:07:09

Thread 404d. Board sliding hard. New info on this?

permalink

OrganicPINEAPPLES | 7 points | Nov 09 2016 16:07:24

The /pol thread was getting g close...then nothing? What's the deal? Any updates?

permalink

birthdaysuit11 | 8 points | Nov 09 2016 19:25:29

Seems like 4chan has been silenced.

permalink

Ask_If_Ima_firetruck | 10 points | Nov 10 2016 06:22:21

You know 4chan threads get auto deleted after a while right?

permalink

birthdaysuit11 | 3 points | Nov 10 2016 07:43:24

Oh, no.

permalink

thor614 | 6 points | Nov 10 2016 18:57:17

The one that is on 9-9-15. That is the same day that john and tony talk about making a "Pasta". I hope it's just a coincidence.

Edit: turns out comet ping pong owner was going to be there or something. Can someone verify?

permalink

klaengur | 4 points | Nov 09 2016 10:30:30

http://www.cometpingpong.com/app/download/4741080860/0gu0rgihy78uep6a.zip.pdf

permalink

cndman | 3 points | Nov 09 2016 15:48:51

What is it?

permalink

Im_Justin_Cider | 1 points | Nov 09 2016 21:13:03

It's a menu

permalink

illBoopYaHead | 1 points | Nov 09 2016 21:22:25

Their menu

permalink

BarryOSeven | 2 points | Nov 09 2016 21:45:09

It's not the file you're looking for it's download id 4741080860 and is simply the menu pdf

There might be other id's with real downloads.

permalink

throwawaypizzagate | 1 points | Nov 10 2016 03:54:33

I got played, I was so excited to see this in my notifications.

permalink

hoeskioeh | 1 points | Nov 10 2016 14:38:26

unless you know the DL password, all you get is the pizza menu pdf.

this does not mean, that the mentioned file is harmless, it just mean we don't know the PW.

it's webmagic :)

permalink