Difference between revisions of "Frog Fractions 2/Decaytruth info"

From Game Detectives Wiki
Jump to: navigation, search
[unchecked revision][unchecked revision]
(MD5 Hashes in the Source Code)
Line 24: Line 24:
 
The following are the characters and their pages;
 
The following are the characters and their pages;
  
Index: 1
+
Index: 1
Hours: 2
+
Hours: 2
About: B
+
About: B
Menu: Z
+
Menu: Z
Beer: A
+
Beer: A
Privacy: Y
+
Privacy: Y
Admin: X
+
Admin: X
  
 
=Theories and conjecture=
 
=Theories and conjecture=

Revision as of 00:15, 6 November 2016

Main Page > List of Investigations > Frog Fractions 2 > Decaytruth info

Decaytruth.info, or the website for The Ashby Brewery and Indie Game Studio, is a major lingering mystery in the Frog Fractions 2 ARG. This page describes what we know so far, and theories about how to proceed.

Background

On September 23, 2015, the Frog Fractions 2 Kickstarter posted update #11, The Ashby Brewery and Indie Game Studio Fall 2015 Quarterly Brewsletter. This video contained three audio glitches before the words decay (0:55), truth (1:44), and info (2:08). It was quickly surmised that was directing us to http://decaytruth.info/, the website of the Ashby Brewery and Indie Game Studio.

Pages

Admin Page

The admin page has been the subject of much oddness and speculation.

The admin page can (sometimes) be accessed by clicking on a π symbol in the bottom right of the privacy page.

Initially, the combination of admin/admin actually worked, and granted access to the site's actual admin, allowing several people to alter the source code of the site. These events are chronicled in this NeoGaf thread. This access was quickly removed, and the changes were restored back to normal. Since then, no access has been found.

The login fields behave in several unusual ways. The vast majority of combinations will enter a return of 'Bad login'. However, if an identical username and password are entered, the site returns the same with a question mark at the end. For example, entering a username and password of 'admin', returns the following result;

Even more strangely, there is no limit to the amount of text that can be entered, and no limitations on entering plain test. This means it is possible to enter html or javascript, to cause the site to behave in interesting ways, or even display files;

MD5 Hashes in the Source Code

When the source code is viewed, each page displays a unique MD5 hash. This displays a different hash for each person who visits the site. Some brute force code was written, and it was found that this translated to the user's IP address, and one additional character. This can be confirmed by entering your IP address and the respective character into and MD5 converter - the output will match the key in the source.

The following are the characters and their pages;

Index: 1
Hours: 2
About: B
Menu: Z
Beer: A
Privacy: Y
Admin: X

Theories and conjecture