Difference between revisions of "Killing Floor 2"
[unchecked revision] | [checked revision] |
m (changed up the content order) |
|||
(14 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
+ | |||
{{argbox | {{argbox | ||
| float = right | | float = right | ||
| name = Killing Floor 2 | | name = Killing Floor 2 | ||
| image = File:kf2logo.jpg | | image = File:kf2logo.jpg | ||
− | |||
| description= A set of Killing Floor 2 Puzzles - also known as "From a Friend". | | description= A set of Killing Floor 2 Puzzles - also known as "From a Friend". | ||
− | | creator = Tripwire Interactive | + | | creator = [http://www.tripwireinteractive.com/ Tripwire Interactive] |
− | | type = | + | | type = Official |
− | | status = | + | | status = Completed |
| discovered = 2017-04-21 | | discovered = 2017-04-21 | ||
}} | }} | ||
[[Main Page]] > [[List of Investigations]] > '''Killing Floor 2''' | [[Main Page]] > [[List of Investigations]] > '''Killing Floor 2''' | ||
− | The Killing Floor 2 ARG/puzzle chain, also known as '''From a Friend''', began on April 21, 2017. | + | The Killing Floor 2 ARG/puzzle chain, also known as '''From a Friend''', began on April 21, 2017. It was speculated that these puzzles would be leading towards the reveal of an in-game summer event. Tripwire regularly released updates to the puzzle, along with their weekly developer updates. |
__TOC__ | __TOC__ | ||
Line 30: | Line 30: | ||
fromafriend/thestart.png</code> | fromafriend/thestart.png</code> | ||
− | + | The decoded ciphertext led us to '''<nowiki>http://media.tripwirecdn.com/fromafriend/thestart.png</nowiki>''', which hosted the following image: | |
− | |||
− | The decoded ciphertext led us to '''<nowiki>http://media.tripwirecdn.com/fromafriend/thestart.png</nowiki>''', which | ||
[[File:Thestart.png|frameless]] | [[File:Thestart.png|frameless]] | ||
− | == | + | == Tripwire Atlassian Page == |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | On May 4, 2017, a [http://steamcommunity.com/games/232090/announcements/detail/1307577968580886736 double XP and drop weekend] was announced by Tripwire Interactive which also included a Cipher: | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | On May 4, 2017, a [http://steamcommunity.com/games/232090/announcements/detail/1307577968580886736 | ||
<code>ah?mIoehseuktene osn e tg t okartih!yrCdhoo ge ne elcp</code> | <code>ah?mIoehseuktene osn e tg t okartih!yrCdhoo ge ne elcp</code> | ||
− | The | + | The cipher was later revealed using a [https://www.reddit.com/r/codes/comments/69abg1/short_ciphertext_waiting_to_be_solved/dh55bs2/ columnar transposition cipher]: |
<code>Is there anyone out there looking? Check the mod pages!</code> | <code>Is there anyone out there looking? Check the mod pages!</code> | ||
− | Clues were then discovered on [https://tripwireinteractive.atlassian.net/wiki/pages/diffpages.action?originalId=95720602&pageId=95721488 Tripwire's Atlassian page], which lead | + | Clues were then discovered on [https://tripwireinteractive.atlassian.net/wiki/pages/diffpages.action?originalId=95720602&pageId=95721488 Tripwire's Atlassian page], which lead us to [https://media.tripwirecdn.com/fromafriend/Puzzle.png this image]. Modifying the color levels of the image reveals the puzzle piece, which appears differently depending on how it was extracted. |
[[File:PuzzleRevealed.jpg|800px]] | [[File:PuzzleRevealed.jpg|800px]] | ||
[[File:SplatterPiece.png]] | [[File:SplatterPiece.png]] | ||
− | |||
== Security Footage == | == Security Footage == | ||
Line 73: | Line 58: | ||
As a proof of good will we are releasing some security footage from a undisclosed Horzine facility."<br><br> | As a proof of good will we are releasing some security footage from a undisclosed Horzine facility."<br><br> | ||
https://media.tripwirecdn.com/032317/cam_02.mp4</code> | https://media.tripwirecdn.com/032317/cam_02.mp4</code> | ||
− | |||
− | |||
During the last half of the cam_02 footage, "[https://media.giphy.com/media/9BiKJRr73QUhi/giphy.gif cam_04.webm not found]" is slightly visible. Putting "cam_04.webm" into the .../fromafriend/ directory provides [https://media.tripwirecdn.com/fromafriend/cam_04.webm a new webm.] | During the last half of the cam_02 footage, "[https://media.giphy.com/media/9BiKJRr73QUhi/giphy.gif cam_04.webm not found]" is slightly visible. Putting "cam_04.webm" into the .../fromafriend/ directory provides [https://media.tripwirecdn.com/fromafriend/cam_04.webm a new webm.] | ||
Line 82: | Line 65: | ||
[[File:camera4.png]] | [[File:camera4.png]] | ||
− | '' | + | == keeplooking.png == |
+ | |||
+ | On May 17, 2017, more information was uncovered on the [https://tripwireinteractive.atlassian.net/wiki/discover/all-updates Tripwire Atlassian] homepage. Jared Creasy made another change to the website before Puzzle.png, by [https://tripwireinteractive.atlassian.net/wiki/pages/diffpages.action?originalId=95720505&pageId=95721028 reuploaded a photo] with a "FAF" description underneath. | ||
+ | |||
+ | Image analysis reveals no changes between the two photos, however, the data was slightly altered in the newest version. If you open the photo in a text editor, the very last line reads "... keeplooking.png" | ||
+ | |||
+ | As usual, you can find the image on the [http://media.tripwirecdn.com/fromafriend/keeplooking.png tripwirecdn website]. Note that this image was added before Puzzle.png, and therefore is the true second piece to the puzzle. | ||
+ | |||
+ | [[File:keeplooking.png]] | ||
+ | |||
+ | == Background Interference == | ||
+ | |||
+ | On May 27, 2017, [http://steamcommunity.com/games/232090/announcements/detail/1271551010174144728 a new WWAUT was released] by Tripwire Interactive, with the last few lines containing the next part of the puzzle: | ||
+ | |||
+ | '''LOUD NOISE WARNING''' <code>http://media.tripwirecdn.com/052617/sample.wav</code> | ||
+ | |||
+ | Running the audio through spectrogram software reveals a [https://i.imgur.com/i7eSxfer.png hidden message,] (Cleaned version down below.) | ||
+ | |||
+ | [[File:kf2arg-HiddenMessageClean.png]] | ||
+ | |||
+ | Using the information around the newly formed picture reveals instructions on how to arrange an [https://i.imgur.com/4VMZDi8.png Enigma decipher]. The result is a sentence spelled out in one word: | ||
+ | |||
+ | <code>ANTONWOULDBEPROUD</code> | ||
+ | |||
+ | == A Closer Look == | ||
+ | |||
+ | On June 3rd, 2017, Yoshiro made [http://steamcommunity.com/games/232090/announcements/detail/1271551821042306635 another post]. The final line of the post was this: | ||
+ | |||
+ | <code>Ybn avogyo wii erqenje. Vm wf eb nsh vwjrz jydcr, tzy nolpg vt.</code> | ||
+ | |||
+ | By using the Vigenere cipher, as well as a key of <code>ANTONWOULDBEPROUND</code> (note the extra 'N'), it was decoded: | ||
+ | |||
+ | <code>You missed the package. It is in the usual place, all rared up.</code> | ||
+ | |||
+ | Visiting http://media.tripwirecdn.com/fromafriend/Package.rar downloads an encrypted archive, which can be opened with the password "<code>antonwouldbeproud</code>". Inside the archive are a bunch of puzzle pieces, named as miscellaneous words from the English language. Assembling the puzzle pieces, combined with the puzzle pieces found from the previous puzzles, yields the following image: | ||
+ | |||
+ | [[File:KF2 package puzzle.jpg|500px]] | ||
+ | |||
+ | Re-arranging the puzzle pieces' names, we get the following message: | ||
+ | |||
+ | <pre> | ||
+ | We can't wait to meat (meet) you once more, are you ready to play with us? We have been waiting to come out for such a long time, for you to return. It won't be long before the curtains rise. See you soon, The Ring Master And Friendly Zeds. | ||
+ | </pre> | ||
+ | |||
+ | == Summer Sideshow Event == | ||
+ | |||
+ | On June 12, 2017, Tripwire [https://www.youtube.com/watch?v=i1RVtdWcTDE officially unveiled] the Summer Sideshow event, which prominently featured the completed poster we had just assembled. The next day, the event was playable in-game. |
Latest revision as of 15:58, 7 July 2018
Killing Floor 2 | |
---|---|
A set of Killing Floor 2 Puzzles - also known as "From a Friend". | |
Type | Official |
Creator | Tripwire Interactive |
Discovered | 2017-04-21 |
Main Page > List of Investigations > Killing Floor 2
The Killing Floor 2 ARG/puzzle chain, also known as From a Friend, began on April 21, 2017. It was speculated that these puzzles would be leading towards the reveal of an in-game summer event. Tripwire regularly released updates to the puzzle, along with their weekly developer updates.
Contents
Initial Announcement
On April 21, 2017, a Steam announcement was made by Tripwire Interactive:
L krsh wklv phvvdjh pdnhv lw rxw! Kruclqh lv xs wr qr jrrg dqg wkh zruog qhhgv wr nqrz! Zlwk dqb oxfn brx'oo ghflskhu wklv dqg ilqg wkh foxhv L'oo eh ohdylqj. Brx duh wkh rqob krsh zh kdyh wr vwrs wklv ehiruh lw lv wrr odwh!
lxusglxoktj/znkyzgxz.vtm
Using ROT23 for the first part, and ROT20 for the filename at the end, this ciphertext was decoded to:
I hope this message makes it out! Horzine is up to no good and the world needs to know! With any luck you'll decipher this and find the clues I'll be leaving. You are the only hope we have to stop this before it is too late!
fromafriend/thestart.png
The decoded ciphertext led us to http://media.tripwirecdn.com/fromafriend/thestart.png, which hosted the following image:
Tripwire Atlassian Page
On May 4, 2017, a double XP and drop weekend was announced by Tripwire Interactive which also included a Cipher:
ah?mIoehseuktene osn e tg t okartih!yrCdhoo ge ne elcp
The cipher was later revealed using a columnar transposition cipher:
Is there anyone out there looking? Check the mod pages!
Clues were then discovered on Tripwire's Atlassian page, which lead us to this image. Modifying the color levels of the image reveals the puzzle piece, which appears differently depending on how it was extracted.
Security Footage
On May 5, 2017, a "Statement From Horzine" was distributed:
I have been asked to pass along the following statement from Horzine:
"We at Horzine would like to disabuse the rumors that things may have gotten worse with the ZED outbreaks or that "unethical" experiements are continuing. Horzine is dedicated to the fight against, and containment of, the threat that the ZEDs pose to us all.
As a proof of good will we are releasing some security footage from a undisclosed Horzine facility."
https://media.tripwirecdn.com/032317/cam_02.mp4
During the last half of the cam_02 footage, "cam_04.webm not found" is slightly visible. Putting "cam_04.webm" into the .../fromafriend/ directory provides a new webm.
At roughly 2.5 seconds, a new puzzle piece is revealed.
keeplooking.png
On May 17, 2017, more information was uncovered on the Tripwire Atlassian homepage. Jared Creasy made another change to the website before Puzzle.png, by reuploaded a photo with a "FAF" description underneath.
Image analysis reveals no changes between the two photos, however, the data was slightly altered in the newest version. If you open the photo in a text editor, the very last line reads "... keeplooking.png"
As usual, you can find the image on the tripwirecdn website. Note that this image was added before Puzzle.png, and therefore is the true second piece to the puzzle.
Background Interference
On May 27, 2017, a new WWAUT was released by Tripwire Interactive, with the last few lines containing the next part of the puzzle:
LOUD NOISE WARNING http://media.tripwirecdn.com/052617/sample.wav
Running the audio through spectrogram software reveals a hidden message, (Cleaned version down below.)
Using the information around the newly formed picture reveals instructions on how to arrange an Enigma decipher. The result is a sentence spelled out in one word:
ANTONWOULDBEPROUD
A Closer Look
On June 3rd, 2017, Yoshiro made another post. The final line of the post was this:
Ybn avogyo wii erqenje. Vm wf eb nsh vwjrz jydcr, tzy nolpg vt.
By using the Vigenere cipher, as well as a key of ANTONWOULDBEPROUND
(note the extra 'N'), it was decoded:
You missed the package. It is in the usual place, all rared up.
Visiting http://media.tripwirecdn.com/fromafriend/Package.rar downloads an encrypted archive, which can be opened with the password "antonwouldbeproud
". Inside the archive are a bunch of puzzle pieces, named as miscellaneous words from the English language. Assembling the puzzle pieces, combined with the puzzle pieces found from the previous puzzles, yields the following image:
Re-arranging the puzzle pieces' names, we get the following message:
We can't wait to meat (meet) you once more, are you ready to play with us? We have been waiting to come out for such a long time, for you to return. It won't be long before the curtains rise. See you soon, The Ring Master And Friendly Zeds.
Summer Sideshow Event
On June 12, 2017, Tripwire officially unveiled the Summer Sideshow event, which prominently featured the completed poster we had just assembled. The next day, the event was playable in-game.