Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

salt.cgi | secure tripcodes

Name: Anonymous 2010-06-04 11:01

$name .= '!!'.substr(base64_encode(pack("H*",sha1($sectrip.$salt))),0,15);

I think that's how secure trips are generated based on shiichan source and some googling.

possible guesses of $salt are generated from openssl rand 448 (this is how salt.cgi was generated) or the string LOLLOLOLOLOLOLOLOLOLOLOLOLOLOLOL

imageboards are similar yet they use a different salt.

also someone get me that salt.cgi : |

i think http://desktopthread.com/tripcode.php has a working version of it (see dis.4chan Secure Tripcode)

Name: !!HiDpG3gLAk5vNGS 2010-12-28 2:57

sdfsdjjjkl

Name: !!HjKOdFF7ieKUCYS 2010-12-28 2:57

sdfsdjjjkl

Name: !!Ib9VoSuViyrvwmY 2010-12-28 2:57

sdfsdjjjkl

Name: !!pI0VBkYI19COeos 2010-12-28 2:57

sdfsdjjjkl

Name: !!5f7WwLdW6Hp5ih+ 2010-12-28 2:57

sdfsdjjjkl

Name: !!KyUM7HVD17WTNNL 2010-12-28 2:57

sdfsdjjjkl

Name: !!HaCqyutuiGVgZbs 2010-12-28 2:57

sdfsdjjjkl

Name: !!OzKlZy/LcaVRqE1 2010-12-28 2:57

sdfsdjjjkl

Name: !!GkLP3FDZCDxJ8L1 2010-12-28 2:58

sdfsdjjjkl

Name: !!J5yGFUEhjtWiK8A 2010-12-28 2:58

sdfsdjjjkl

Name: !!qej4CXULJqJr9l2 2010-12-28 2:58

sdfsdjjjkl

Name: !!/ZZYCpn455CFqoJ 2010-12-28 2:58

sdfsdjjjkl

Name: !!6l899wfS2KAnvr+ 2010-12-28 2:59

sdfsdjjjkl

Name: !!NXBjBL7A8TJ5afQ 2010-12-28 2:59

sdfsdjjjkl

Name: !!1DkVXUEg/Jy02NR 2010-12-28 2:59

sdfsdjjjkl

Name: !!kJ8VjPToBJGUJBz 2010-12-28 2:59

sdfsdjjjkl

Name: !!x9jUrxvNROTXKJ0 2010-12-28 2:59

sdfsdjjjkl

Name: !!CSi//Iat6cxhAZI 2010-12-28 2:59

sdfsdjjjkl

Name: !!aJj+qwFZ3GwFoV2 2010-12-28 3:00

sdfsdjjjkl

Name: ssdfdd 2010-12-28 3:02

asdfasdfasdf

Name: !!wmgE0uoa4/lwvV0 2010-12-28 3:03

asdfasdfasdf

Name: !!7gMgoH91DsgWMr9 2011-01-31 16:33

test.

Name: !bgREVLN8FU 2011-01-31 16:34

test2.

Name: !!aeprogaeprong 2011-04-30 17:43

asa

Name: !!B7h6bWg0bPBZGDi 2011-04-30 17:43

asa

Name: !!wc54yI6RGAbRvAI 2011-08-27 4:46

testin

Name: !Ep8pui8Vw2 2011-08-27 5:48

fag

Name: Moot !Ep8pui8Vw2 2011-08-27 5:52

hai guise

Name: Anonymous 2011-08-27 6:57

>>188
Are you a wizard?

Name: !MhMRSATORI 2011-08-27 7:22

TEST

Name: !Ep8pui8Vw2 2011-08-27 7:23

test

Name: !MhMRSATORI 2011-08-27 9:31

Testing.

Name: fagasdfasdfasdfgasdfasdf !!u2fp+LU0DP7Tkr1 2011-08-27 9:48

TSET

Name: !LBDyyQgY76 2011-08-27 10:42

Name: Test !lPXPaFbnRk!QsbE4wlY+RpSK7h 2013-01-07 16:33

test

Name: test !SakuNRRNQ. 2013-01-07 16:38

.

Name: test !rvj0.5cZJo!BDcR63T1u/Q2+FK 2013-01-07 16:39

..

Name: !YRbvxA1rfw 2013-07-02 0:39

t

Name: Anonymous 2013-07-02 3:22

WTF IS GOING ON??!?!? THE EMPIRE SPAMS BACK??!?

Name: !PRoGN.piPE 2013-07-02 7:05

    } else {

        $salt = strtr(preg_replace("/[^\.-z]/",".",substr($trip."H.",1,2)),":;<=>?@[\\]^_`","ABCDEFGabcdef");
        $trip = substr(crypt($trip, $salt),-10);
        $name.=" <span class=\"postertrip\">!".$trip;
        }
    }


    if ($sectrip != "") {
        $salt = "LOLLOLOLOLOLOLOLOLOLOLOLOLOLOLOL"; #this is ONLY used if the host doesn't have openssl
                                                #I don't know a better way to get random data
    if (file_exists(SALTFILE)) { #already generated a key
        $salt = file_get_contents(SALTFILE);
    } else {
        system("openssl rand 448 > '".SALTFILE."'",$err);
        if ($err === 0) {
            chmod(SALTFILE,0400);
            $salt = file_get_contents(SALTFILE);
        }
    }
        $sha = base64_encode(pack("H*",sha1($sectrip.$salt)));
        $sha = substr($sha,0,11);
            if($trip=="") $name.=" <span class=\"postertrip\">";
            $name.="!!".$sha;
    }

excerpt from http://tanami.org/overscript/files/yotsuba.txt

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List