throwawaypizzagate | 129 points
on /pol/ recently, password protected area of Comet found
http://www.cometpingpong.com/protected/ Someone please find the password for this, someone had a password and then the thread got deleted super quick. There was a whole bunch of zip files
EDIT: Here was what it looked like http://imgur.com/a/stenG
Deathoftheages | 33 points
Ok if I had to guess if this at all has to do with the whole pedo ring those zips are going to be child porn and that's why each one has a separate password because they sell them in packs. Probably separated by themes of some sort. I'd suggest not spamming this around. If they get wind they will just disable the page.
Phod | 26 points
Lol what restaurant has a password protected area with weird zip files. This is totally CP. anyone know some hackers?
JangoTheJanitor | 24 points
Someone should index a huge batch of the Podesta emails and run that through a custom dictionary generator like the kind in AccessData's Password Recovery Toolkit, and then run dictionary attacks against the zip file with something like John the Ripper.
Gem420 | 4 points
If I could I would. Give it a shot, just protect yourself first.
JangoTheJanitor | 6 points
I'm a cybersecurity professional and digital forensic examiner. I deal with this kind of stuff on the daily, and I'm definitely considering giving it a crack.
IMLOwl | 1 points
The chances of something like this being able to be dictionaried are extremely slim. File names appear to be ualpha-numeric random and I expect DL keys are also. Brute force time would be billions of years.
JangoTheJanitor | 2 points
I get where you're coming from but it's at least worth going through the motions. There's nothing to lose from the action, and a personalized dictionary attack technically isn't bruteforcing, but I know what you mean. Podesta's data might not be the most relevant either (Brock or Alefantis would be my first choice) but at this point there's no reason not to try.
On another note, has anybody checked some of the bizarre and seemingly random CPPP social media photographs for steganography? Just a random thought I had.
Gem420 | 1 points
I spoke with someone who is very knowledgeable and he said this can be cracked, but he won't do it. :( he also confirmed those files are very large and is curious what's in those .txt files...
HillarysPizzaParty | 10 points
If someone were to crack that password, it might yield interesting info.
OrganicPINEAPPLES | 7 points
The /pol thread was getting g close...then nothing? What's the deal? Any updates?
birthdaysuit11 | 8 points
Seems like 4chan has been silenced.
thor614 | 6 points
The one that is on 9-9-15. That is the same day that john and tony talk about making a "Pasta". I hope it's just a coincidence.
Edit: turns out comet ping pong owner was going to be there or something. Can someone verify?
klaengur | 4 points
http://www.cometpingpong.com/app/download/4741080860/0gu0rgihy78uep6a.zip.pdf
BarryOSeven | 2 points
It's not the file you're looking for it's download id 4741080860 and is simply the menu pdf
There might be other id's with real downloads.
hoeskioeh | 1 points
unless you know the DL password, all you get is the pizza menu pdf.
this does not mean, that the mentioned file is harmless, it just mean we don't know the PW.
it's webmagic :)
klorptar | 59 points | Nov 09 2016 00:09:59
Nothing fishy here. Just huge, PW protected zip files in hidden area of a pizza website.
permalink
[deleted] | 42 points | Nov 09 2016 05:01:09
You need to go farther down the rabbit hole.
Ask yourself, if you were using a legitimate business as a front for selling something highly illegal, how would you go about it?
Code words - use common words for something else: ie, pizza means kids.
Proxy buying - purchase a pizza, leave a large enough tip, get a receipt with an encryption key printed on it. Everyone thinks the number on the receipt is random, but the number is a password. When you get home, fire up your tor browser and download "dessert". As far as transactions go, your credit card bill shows you paid $100 for a night out, but your internet traffic would show you visited the hidden web page and made a download.
The only way to test that theory would be to correspond credit card transactions with web traffic to this website. That sort of thing is best left to alphabet agencies, but they too might be implicated in this and thus reluctant to blow the lid off it.
permalink
ragecry | 13 points | Nov 09 2016 20:08:55
This leaked Stratfor email is pertinent to what you're saying, they are testing a credit card processing system for pizza:
testing the Pizza Pages - your list
Search Wikileaks for "pizza pages" and you'll find more.
permalink
[deleted] | 8 points | Nov 09 2016 20:49:56
This is where Palantir comes in.
https://www.youtube.com/watch?v=dVsx4I8gkKk
There was an entire list of pizza websites emanating from the same domain 50.16.177.65
https://archive.4plebs.org/pol/thread/96542181/
A company is in the business of providing restaurants with a platform for ordering and payment processing. I'm not certain that Comet Ping Pong is part of this payment system. But Besta Pizza (another connected "pizza" joint) is.
https://ordersnapp.com/our-clients
permalink
[deleted] | 3 points | Nov 09 2016 21:33:04
Yup, I saw all those, including the attachment word file where they are doing pizza tests on their online payment system. Also, that "14-Fish" picture of Podesta seems to have been taken in Austin.
Also search Dentist Samuelson - could just be a bunch of clowns talking shit but who knows.
https://wikileaks.org/gifiles/docs/13/13828_re-dentist-scott-samuelson-.html
permalink
Graceful_Ballsack | 3 points | Nov 12 2016 21:14:34
This is sarcasm guys
permalink