
Remember Reg.

I was doing a bit of OSINT-ish poking around on this character, Mellissa Carone.
She’s a supposed voter fraud “whistleblower” for Rudy Giuliani. His star witness claims to have essentially seen all the voter fraud ever in her seemingly-drunken, insane testimony at a hearing in Michigan. You really have to see it to believe it. She made a complete ass out of herself trying to bullshit everyone in the room.
Even Rudy, at one point, had to be like “whoa, down girl”.
Ordinarily I wouldn’t be dwelling on a private individual in a blog post, but Mellissa chose to step into the public arena.
So I figured I’d see what I could dig up on the web, in relation to a couple of her claims. Just practicing some OSINT on a public figure.
Anyway, in her testimony she claimed to be an IT contractor hired by the current conspiracy scapegoat “Dominion“. Now she says she can’t get work anymore because “the Democrats destroyed her life”, and so on.
As far as jobs go, her LinkedIn says she’s been an intern at a place called Ciber Global but with the title “Cyber Security Analyst”. She mentions Ford Motor in a subheading on this one.
Next one down, same timeframe as the Ciber job, again, “Cyber Security Analyst” for Ford Motor Company. Maybe lent out as a temp?
Further back, an internship as an IT Technician at a local painting company.
And even further back, an IT Specialist/Help Deak [sic] person for Millennium Servica [sic]. This might be a Remodelling and Repair Contractor, or this unknown, defunct company.
Whichever. Doesn’t matter.
Along side all this, she’s also listed as being a graduate of ITT Technical Instutute and the University of Michigan, working on an associates degree in Computer/Information Technology Administration and Management.
UPDATE: Apparently she’s been up to some other stuff, too. Whoops…
In addition to her work experience, her profile features a set of certificates and awards:
Nothing really of interest. I can’t even verify her Ciber employment, never mind this certificate. But that’s fine. I don’t really care. Any discrepancies are probably easily explained with a little more detail. (Benefit of the doubt, and all that.)
But then I scroll over to the third cert; the “Cyber Awareness Challenge” completion certificate:
What’s that logo? Department of… hmm. I can guess, but let’s ZOOM AND ENHANCE:
The Department of Defense?!
Woo! Impressive, right?
So I looked around for that, and found… THE 2021 CYBER AWARENESS CHALLENGE!
You too — yes, YOU — can take the unclassified training course, just like she did, and get your very own DoD Certificate of Completion for you to type “FART BUTT” on and save to a PDF and put on your own profile.
And best of all, it’s in COLOR and updated for 2021!
But in all seriousness, I encourage you to take a look at this small, free course they’re offering.
It’s actually well put together and rather creative for a multiple-choice quiz that marks you correct even when you’re wrong. You can’t lose!
The real meat of it, though, are the details it provides. There’s a lot of “duh” basic security things (don’t bring in external devices, don’t hold security doors open for anyone, etc), but it actually gives some interesting insights into how they handle working with classified security information, among other things.
Quite a bit of video, too. Here’s my favorite:
So, a couple weeks ago I was watching this video tribute to Super Mario World‘s 30th anniversary.
At around the 17:20 mark, in the middle of talking about various tie-in products to promote the game, it brings up Mario & Yoshi’s Adventure Land. A one-episode animated movie that follows Mario and Luigi through, essentially, the events of Super Mario World.
What makes it unique is that it this is a “VCR game” of sorts that uses the Terebikko: an interactive ‘quiz’ device that mimics a telephone. Mario calls you. The phone rings. You pick it up. He asks you a question that needs a 1, 2, 3, or 4 response. (Or red, green, yellow, blue.)
You press the answer within the allotted time, and you get a response. (Near I can tell, it mutes the phone for the inappropriate response, but that’s something we’re going to find out definitively.)
And it’s more than just Mario. There’s a whole catalog of videos made for it in Japan, including Dragon Ball Z and Sailor Moon.
I found it all oddly fascinating. And my curiosity started to kick in. It seemed so simple, but it was a clever idea. I loaded the audio into Audacity and realized I could make out binary… uh oh.
See, one of the things I’ve always had an interest in, but never got a chance to try was demodulation of a digital signal from an audio file. Like the screeching of a modem, or a game loaded off an audio tape into a ZX Spectrum. That kind of thing. This seemed like the perfect on-ramp for it.
With very little actual information online, this also seemed like a perfect reverse engineering project in general.
I found out they released a version of this in the United States in 1989 under the Mattel label, a year after it’s debut in Japan from Bandai, and… I found one on eBay for under $20 shipped. 😎
So now I’m, seemingly, irrevocably committed to this project, now that money is involved. 😏
Here’s what I’m planning. I’ve already spent a couple days dicking around and have a stack of notes. I’m hoping to get at least several decent blog posts out of this adventure:
That last one is unlikely, but hey, if I haven’t burned myself out on the entire thing by that point, who knows?
UPDATE (2021-03-10): I’ve finally setup a site wiki for content like this. Here’s the entry for the Terebikko: https://wiki.network47.org/terebikko
(Lots of spoilers here.)
Season 11 of Archer has been over for a while now, but a recent video from Wisecrack discussing the downside of the “coma seasons” got me thinking about it again. (For the record, I thought the coma seasons were generally fun, interesting “what if” anthologies that I understood helped break up creator Adam Reed’s creative block. But I was happy to see them in the rear view mirror.)
This latest season? Fun in the moment-to-moment. But on the whole? I was left feeling apathetic.
I thoroughly enjoyed the rest of the team becoming better without him, while he was in a coma. I mean, I loved the better people they became. Especially Cyril. It was like they all evolved in their ultimate forms.
And I know, deep down, that “backsliding” is where the plot of the show HAS to go. Their transformation is the setup, and Archer being the reason they were held back is the punchline.
I understand that. But it also brings a great deal of personal frustration.
I found myself thoroughly enjoying the new, improved ISIS. And I kind of hoped the show was going to subvert my expectations. Instead of resetting everyone to their pre-coma semi-incompetency (they weren’t technically shitty agents before; just… distracted… and held back), let’s explore the a new normal. One where Archer turns his back on his friends, because he feels betrayed. And they no longer need him to be the agent of chaos ‘glue’ to keep them successful.
For a while, I seriously believed they were going to do this.The various clues I picked up on almost seemed to suggest Sterling might basically say “fuck it” and start recruiting for his own, competing spy agency. And maybe we’d see future seasons dip into that awkward, jealous rivalry. It certainly looked like Sterling was beginning to accumulate a series of friends who actually LIKED him, for a while there. Aleister, Barry, Hands. Hell, maybe even steal Pam. A competing agency of people who actually appreciate him, and maybe work better with him around? Now that’s an interesting premise to explore for a while.
But… it didn’t go there.
Instead it was, apparently, just business as usual? Instead, Lana’s marriage begins to fall apart. Cyril relapses into his “beta” position. And the rest follow suit, with the whole show reset back to Archer being the cause of, and solution to all of their problems.
And that’s a letdown. The season felt like it was building this arc in the background… but it wasn’t. It was just my imagination. The show was just backsliding. Like the characters themselves.
And now with Sterling seeing coma illusions in the finale, I don’t know if this is a fake-out and he’s still in the coma. Or is this some new psychosis?
I… just don’t care…🤔
As a massive fan of the show for a very long time, that genuinely hurts to admit.
Don’t get me wrong, the show is still fun, if a bit tired. But it just feels completely aimless in the larger view. And that’s on them: they introduced the season-long arc concept back when the show took a hard turn into Archer:Vice. And now, many seasons later, a viewer can’t be blamed for looking for that to continue… trying to find a thread interlinking the episodes… and feeling kind of empty when nothing of consequence is there.
Though, the coma illusion stuff in the finale feels like wanting your cake and eating it. But I guess we’ll see what happens next season for that thread. If there WAS anything anything TO it.
So yeah. I really don’t know what the hell they’re doing at this point.
There was a predictable vibe to the show that was it’s meat and potatoes in prior years that is hard to accept returning to. Those jokes and tropes made the show what we love. But increasingly Archer feels like a show that knows that it has to change, tries for a bit, but then gets cold feet about commitment and swings the steering wheel back onto the main road. Sterling’s daughter was the last straw of my patience for that kind of thing: it felt like we could finally see even a sliver of permanent character development for him, but instead AJ just becomes another delivery system for TWO finger-raised-while-drinking jokes, and, this season, a kidnapping plot point.
Maybe it was better to just leave Sterling in the coma and leave the future to our imagination. 🤔
As a long time fan of Watch Dogs 2, I observed the initial concept and trailer for Watch Dogs: Legion roll out with a feeling of trepidation.
They’d dropped the number ‘3’ from the title, first off. Perhaps a trivial change, but for the paranoid, this was an ominous sign that things were changing.
And indeed they were.
Gone was a specific lead character. There was a big push towards the idea that you could “take control of anyone”. And it seemed like there was an overall less ‘realistic’ feel: digital-cyber-anarchists in pig masks, skull masks. Lots of masks. And it looked like it took place in a less relatable, less contemporary world, instead set further into the dystopian future.
While I welcomed the change of venue to the UK, everything else I was seeing just wasn’t clicking with me.
I felt like this would likely be where me and the Watch_Dogs™ franchise would part ways… I was all about WD2’s wonderful alternate-yet-familiar world of late 2010s San Francisco, with it’s terrific energy thanks to the rebel/ASCII pop art designs, and surprisingly compelling personalities. Not to mention it felt very relatable to today’s world. Slightly more advanced than today, but not unrecognizably so. Just twenty minutes into the future, you could say. 😏
And it strongly looked as if Legion was poised to throw away most of what appealed to me. So I stopped following the news about it, and decided all the indicators suggested this wasn’t going to be for me.
Then it launched…
Between the gameplay footage coming out, the absolutely brutal 2020 US election, and the frustrating additional delay of the much awaited Cyberpunk 2077 until mid-December, I found myself weak and incapable of holding onto the money in my virtual wallet.
So… how’d it go? Well, I just finished it last night. The “Ubisoft Connect” launcher informs me I’ve put in 49 hours so far. (For comparison, I’ve put a mere 60 hours into Watch Dogs 2. Or so it says. Feels like more.)
But did I like it?
Well, if the nearly 50 hours didn’t suggest it, I’ll spell it out: YES. Watch Dogs: Legion was definitely worth it.
The procedural/every-man rallied citizen gimmick that I was so skeptical about was actually a rather bold creative decision with a wonderful message about the power of the people. I don’t really want to see it return in future entries, but it worked here way better than I’d have ever expected. I didn’t notice similar voices. I’m sure the dupes were there but it was varied enough where it didn’t stand out. The variation and people, backstories, and relationships (!) it generates is rather impressive. (Though sometimes procedural generation can get you into trouble. 😏)
But it also held it back the narrative back in some ways: everyone calls you “DedSec” — a weak, but workable solution to recording lines without the near impossible task of referring to your procedurally generated name personally. Most of the time it sounded like it was referring to you as a representative of the group, but once or twice it just felt awkward. Not a game breaker, though. Not by a long shot.
The cinematics felt like a bit of a downgrade from Watch Dogs 2. Possibly this was due to the procedural nature of your current player character. The nuance of performance previously infused into Marcus and his San Fran DedSec friends is reduced a bit here. Again, forgivable considering the technological circumstances. They’re still generally quite good.
Even if the cinematics don’t always measure up, don’t even get me started on the absolute beauty and insane level of detail of London captured here. This might be the biggest advancement over WD2, and even that game still looks fantastic.
Quite often, especially with raytracing enabled, Watch Dogs: Legion is capable of looking almost photorealistic.
Another… well… I’m hesitant to call it a down side, as it’s merely the side effect of the gimmick.
But I’m kind of bummed that MY Legion experience isn’t everyone elses. It was just for me. Everyone playing this game is (with some exceptions) going to have a different vision of which DedSec member was there in the final act.
For instance, my main DedSec crew was composed of:
There were a dozen others on the team, but once things really got rolling, they were pretty much just not much more than background noise…
For me, Wanda, Theresa, and Saeed ARE the saviors of London.
Yet… they’re not. They’re just folks I recruited along the way, and I got attached to them. My imagination filled in the blanks and made them more interesting.
The game is structured in such a way that I can do that, and the story won’t step on my imagination’s toes.
One other major difference from Watch Dogs 2: there’s a lot of streamlining of the gameplay present.
Many hacks from prior entries are gone. The character skill upgrades are greatly reduced. But you also get certain skills out of the box (like remote controlling vehicles, for example).
Where Watch Dogs 2 had a wealth of various, interesting upgrades, Legion’s options are much more… shall we say, focused… to a handful of weapon, accessory, and drone hack upgrades. Many of the more interesting skills are locked behind specific recruit classes with unique abilities. This is likely why the skill tree was minimized. It gives more value to recruiting the individuals. All the really cool tricks went to them. The “beekeeper” comes to mind, with a cloud of robotic attack bees… the “living statue” guy… the hypnotic “magician”… and so on.
I never got around to checking them out, unfortunately. I locked in my core team pretty fast.
This will likely be something I’ll be willing to explore on subsequent playthroughs. (There’s a perma-death mode, too!)
As for the core skills shared by the team, once you realize the spider-bot lets you take down unaware people from a distance, safely, and with ease, it’s really the only accessory you’ll care about. It kind of makes the game too easy. Nobody is forcing you to use it, of course: most missions have multiple open ended ways to accomplish tasks.
But blimey, it feels silly to NOT use it.
Also important: the drone/turret hijack and betrayal hack skills. Get a drone specialist early on to get access to these quickly, but with enough points in your skills and everyone can do them. (Sorry, Saeed. Thanks for your service.)
Overall, Watch Dogs: Legion is a pretty damned cool experiment. Despite all odds, it largely succeeds in pulling off the trick of it’s central gimmick while still delivering an engrossing (yet ultimately predictable — spoiler!) story.
While it hasn’t dethroned Watch Dogs 2 as my favorite in the series (it’s going to take a LOT to do that, admittedly) it certainly holds it’s own as a solid, enjoyable entry in the series.
⭐⭐⭐⭐
Another Hack the Box write-up. This one is pretty short (EDIT: is it?), but it illustrates an unintended, but important gotcha that hit me.
I found out last time that a seemingly unspoken HTB convention* is that you only post write-ups for challenges that are retired (accessible to the paid VIP folks).
* Honestly, I only saw it mentioned while digging into the forums, and was told about it later when I posted the previous one on Reddit.
While I didn’t see an official explanation for this behavior, I suspect this is keep people from simply Googling for the flag. If that IS the case, I disagree with that idea: any good CTF’er will know to exclude the flag identifier -HTB
or the CTF name (-"Hack the Box"
) when looking for information to help them legitimately solve the problem.
If someone is going to be a rotten rat and cheat their way through the challenges, well, that’s kind of the risk you take when it’s open to the public. Hiding the answers just means they’ll squirrel them away out of sight for the rats to find. (Boy there’s a lot of animals in this paragraph.)
And, of course, if it’s simply to give value to VIP members, well, I have no interest in helping a business maintain a poor model. But I don’t expect that to be the motive here. 😉
Suffice it to say, considering this one hasn’t been retired since 2018, I won’t be sharing it anywhere outside my own blog, apparently. And maybe Twitter. (Hi, Twitter!)
I did this challenge, initially, using Windows. Mostly because this seemed like a pretty easy challenge, and I didn’t think that would be a problem.
The challenge provides you with a zip file, appropriately named misDIRection.zip
.
Unzipping the file produces a .secret/
directory, and inside a series of directories labelled 0-9a-zA-Z. Some of these are empty. But some have 0-byte files named after integers. There were no duplicates among them.
Archive: ../misDIRection.zip creating: .secret/ creating: .secret/S/ extracting: .secret/S/1 creating: .secret/V/ extracting: .secret/V/35 creating: .secret/F/ extracting: .secret/F/2 extracting: .secret/F/19 extracting: .secret/F/27 creating: .secret/o/ creating: .secret/H/ creating: .secret/A/ creating: .secret/r/ creating: .secret/m/ creating: .secret/B/ extracting: .secret/B/23 ...etc...
I thought about this one for a bit, and considered how a message could be encoded.
Then I had an idea: what if the numbers map to a position in an output. Like, where file “1” is, that’s in the S
directory. “2” is in F
, etc.
So I started charting this out in Notepad, but I got about 4 letters deep and realized — wait, I should be doing this in a programmatic way. There are tools for this. Work smarter.
So I pull up the WSL bash prompt and throw down: find . -type f | sort -k 1.13 -n
This finds all the file-type entries under the current directory and pipes the result into sort
. The -k
argument basically says to sort on the 13th column, and -n
specifies a numeric sort.
This gave a pretty clear arrangement: SFrce0rjUjNjdeX5XzFUX1BSNdFUX1NPN2V9
. NICE!
While this wasn’t the flag, of course, it seemed like a solid lead into a second phase.
So I pull up CyberChef and start messing around with it. I go through the usual transformations I try, and Base64 immediately catches my eye: HZÜ{JãR3cuåù_1T_PR5ÑT_SO7e}
.
It’s so painfully close to what I’m looking for. You can SEE the skeleton of a legit Hack the Box flag: HTB{xxx_xxx_xxx_xxx}
. You can see the curly braces, and the underscores, and even the opening “H”. Presumably some of the other letters are correct as well, but you can’t know that yet, of course.
So I went down some weird rabbit holes. The hashid
tool thought it was BigCrypt:
Analyzing 'SFrce0rjUjNjdeX5XzFUX1BSNdFUX1NPN2V9' \[+\] BigCrypt
Everything I tried wound up being big time wasters.
So I gave up and looked for a write-up. Inside that write-up, the guy did everything I did:
WHAT?
I do a search for SFrce0rjUjNjdeX5XzFUX1BSNdFUX1NPN2V9
— and sure enough, there it is.
Am I going crazy? It’s just a basic Base64 decoding. Why is mine different?
Just to verify, I pipe it through the same base64
tool on my end. Nope. Still different.
What am I doing differently here?!
Then it dawns on me: I’m using Windows.
I’d gotten used to doing some formerly Unix-style command line stuff in Windows, thanks to WSL letting me bounce between the two worlds. And that was my mistake.
Let’s take a look:
Well, unzipping a file that creates an alphabet… both upper AND lowercase letters… oh shit.
Riiight… unzipping in Windows means .secret/s
is the same directory as .secret/S
.
Which one you get depends on which one unzipped first. So I had a jumble of upper and lowercase directories that Windows went all YOLO on. And when I jumped over to WSL to do my find
command, the damage was already done.
I needed to unzip the file from Unix.
So I nuked the entire directory and unpacked all of this from a proper Linux bash shell in my lab VM. And sure enough, I have a lot more directories.
I run my find
command, and I get a slightly different version of my string: SFRCe0RJUjNjdEx5XzFuX1BsNDFuX1NpN2V9
.
Note the case differences:
Wrong: SFrce0rjUjNjdeX5XzFUX1BSNdFUX1NPN2V9
Right: SFRCe0RJUjNjdEx5XzFuX1BsNDFuX1NpN2V9
So I pump that through base64 -d
, and we get the CORRECT flag this time: HTB{DIR3ctLy_1n_Pl41n_Si7e}
.
This was frustrating, but still quite educational: in the future I might encounter an issue similar to this, and hopefully I’ll remember this experience. I mean, I didn’t look closely enough at my string, and searching for it in the write-up made me think it was 1:1 exactly the same. All because search tools are, by default, case insensitive. And Windows is case insensitive.
But I’m very sensitive. 😢
Seriously, though don’t get too comfortable with Windows, man. It’ll stab you when you’re not looking!
I don’t for a moment think the author of this challenge intended for this outcome. (I sure didn’t.) But hey: thank goodness SOMEONE wrote a write-up on a non-retired Hack the Box challenge, huh? 😏
I’ve been doing a lot of TryHackMe rooms over the last week or two, but this morning I decided to jump over to HackTheBox to take a look at their OSINT challenges.
While I’ve never done a CTF write-up before, I want to start doing this a bit more often. Especially when I encounter new topics or concepts I’ve never encountered before.
We are looking for Sara Medson Cruz’s last location, where she left a message. We need to find out what this message is! We only have her email:
saramedsoncruz@gmail.com
With this bit of content, I spent a lot of time going through my usual routine…
First, I looked for the username saramedsoncruz
using Sherlock. It’s a tool written in Python that queries a ton of social media services. (There’s websites for this, too.) This pulled up only a couple results:
[*] Checking username saramedsoncruz on: [+] Pinterest: https://www.pinterest.com/saramedsoncruz/ [+] geocaching: https://www.geocaching.com/p/default.aspx?u=saramedsoncruz
When I saw the Geocaching link, I got excited. We could satisfy all of our requirements.
Her last location? Possibly! A potential message left? Sure! Maybe she took a picture of a message left in a cache. Or had comments about a cache she’d just found.
This seemed to be a lock… but, despite a match on that very specific username, it wound up going nowhere.
Struck out with the Pinterest link, but I had low hopes for that one.
At this point, I’m trying everything I know. Manually clawing though “Sara Cruz” accounts (and various permutations on the name) on Facebook and other social media sites. One even had a Guy Fawkes mask for an avatar — I thought to myself “Some dumb hacker shit! Surely, this must be it!”
But, no. Another dead end.
As I’m searching around, I see a link talking about Google IDs and Gmail accounts. It looks interesting, but I put it aside.
I’m about to give up — which is fine by me. Yeah, I’m always a little disappointed when I throw in the towel, but that’s part of the reason I do these CTF challenges: to test what I know, and if it’s something I don’t know: learn. (From write-ups. Like this. 😏)
So I return to the HTB OSINT page, and I take a look at the name of the challenge so I can google a write-up.
“ID Exposed”… hey, waaaait a minute…
I think for a moment as that piece of information zip-zaps across my mind over to the article I’d found earlier: Getting a Grasp on GoogleIDs.
I’d completely overlooked a clue in the title. Turns out this was VERY relevant!
I’ll leave the article for you to see the details, but long story short: there’s a profile ID number attached to every Google account. There’s a couple ways to get this ID outlined in the article.
In my case, I added it to my existing Google Contacts collection and sniffed the data-personid
attribute from the modal dialog of the Contacts page when the contact is opened for editing (it may be seen elsewhere, but this is where I got it).
With this in hand, I went over to the People API people.get
page, which lets you try executing an API endpoint. In order to execute this endpoint call, you’ll need to give permission for your own Google account.
Following the instructions in the article, I plugged in “people/c6412528252752365100
” for the resourceName
, and “metadata
” for the personFields
field.
The call, successful, returned this block of JSON:
{ "resourceName": "people/c6412528252752365100", "etag": "%EgMBNy4aBAECBQciDG1IQ1NWS3NJSEc0PQ==", "metadata": { "sources": \[ { "type": "CONTACT", "id": "58fde0788976062c", "etag": "#mHCSVKsIHG4=", "updateTime": "2020-09-24T15:59:18.216Z" }, { "type": "PROFILE", "id": "117395327982835488254", // <---- "etag": "#4eZz2/IuMFw=", "profileMetadata": { "objectType": "PERSON", "userTypes": \[ "GOOGLE_USER" \] } } \], "objectType": "PERSON" } }
Under the metadata -> sources
entry with the PROFILE
type, there is our GoogleID: 117395327982835488254
.
From here, we can look for various things (again, check the article for what’s possible).
As it turns out, you can take a look at the ‘contributions’ that a GoogleID has made to Google Maps. This means reviews and photos, for the most part. Certainly the kind of data that would tick the boxes of what this CTF solution asks of us.
So, I tack the GoogleID onto the appropriate URL… https://www.google.com/maps/contrib/117395327982835488254/
…and sure enough:
“Flag Watcher”, huh? 😏
No photos, but they’ve posted a review for the ‘Museu do Futebol’ in Brazil, giving it a whopping five stars, and a terse comment of “really nice museum”…
Wait, there’s more.
Like, literally ‘More’.
Click it.
And there’s our flag, buried in a bunch of percent signs to force the comment to collapse. 🙂
HTB{i_W4S_D_I_S_c_O_v_3_R_3_D}
It’s okay to give up, as long as you’re willing to learn.
Just be careful that you’re not overlooking a clue being given to you. Few things suck more than bashing your head against the wall going down a dead end for an hour when a quick re-read of the CTF details might have prevented it. 😳
Came across this over on Hacker News this morning and left a brief thought on it over there (that I’m sure has been ripped to shreds by now). (EDIT: Not so much. But we did reach similar endpoints. Thanks, guys!)
Long story short, even shorter: player manipulates and aligns glitches to basically rewrite the code’s stack to force the game ending sequence to execute. Goes from title screen to prince rescued in ~3 minutes.
From a hacker perspective, this kind of thing is — 😘👌 — excellent. Even if the player didn’t consciously decide to manipulate the stack but happened to stumble onto a combination to make it work, it’s still super cool to break it down, which is what this video does.
Originally this post was a reflection on the ethics of this kind of thing being considered a ‘world record’, and how I’d rather see them split this out into it’s own category.
Instead of investigating first, I just vomited out all my thoughts and feelings without actually seeing how the world decided to handle this. I ran on an assumption. And it was wrong.
Because they DO break it out by category:
Here’s how they break it down — and they are NOT fucking around:
Beat the game, entering and completing every stage and Hammer Bros. fight.
- Time starts on pressing Start on the title screen.
- Time ends on entering the door after defeating Bowser.
This category includes:
- All action stages (numbered stages, fortresses, airships, plants, hands…)
- All overworld Hammer Bros. (including their Boomerang, Fire and Sledge Bros. variations)
Important notes:
- Do not forget the Fire Bros. behind the rock in world 2, the two plants in world 7 and the three hands in world 8!
- If you accidentally transform some Hammer Bros. into a coin ship, you must either beat the coin ship or die on purpose during the coin ship to transform it back into Hammer Bros. and then defeat them.
- Mushroom houses, card games, roulette games and overworld pipes are allowed but not required.
Banned emulators: ZSNES (any version), SNES9x 1.4x
Beat the game as quickly as possible without using any wrong warps or warp whistles. Warp whistles may be collected but not used.
Time starts on pressing Start on the title screen.
Time ends on entering the door after defeating Bowser.Banned emulators: ZSNES (any version), SNES9x 1.4x
Beat the game as quickly as possible without using any wrong warps.
Time starts on pressing Start on the title screen.
Time ends on entering the door after defeating Bowser.Banned emulators: ZSNES (any version), SNES9x 1.4x
Time starts on pressing Start on the title screen.
Time ends when Mario is visible in the princess’ chamber. If the game crashes, the run is invalid.
Banned platforms: Virtual Console, NESClassic, BizHawk (QuickNES core)Note that BizHawk with the NESHawk core is allowed.
And these are just the Super Mario Bros. 3 specific rule sets. Other games have different rules.
For instance, Portal has “Out of Bounds” (any and all tricks allowed), “Inbounds” (camera and portals cannot leave the map), “Glitchless” (use none of the officially recognized glitches), and “Inbounds No SLA” (Save/Load Abuse).
Even something like bloody Cookie Clicker has a whole bunch of rule sets: “1 Million Cookies“, “Neverclick” (bake 1 million cookies without clicking the cookie <= 15 times), “True Neverclick” (bake 1 million cookies without clicking the cookie at all), “Hardcore” (bake 1 billion cookies without upgrades), “40 Achievements” (guess), “1 Heavenly Chip” (🙏).
Finding this out was pretty amazing. Not only were my concerns alleviated, but I’ve actually found a brand new level of respect for the speedrunning. 🙂
And I was able to salvage a lengthy post, and turn it into something positive. Everyone wins!
I didn’t go over every word of this, but I’m fairly sure these are the reenacted insane ramblings of Francis E. Dec. Besides, the phrase “Gangster Computer God” is pretty much his THING. 😉
Francis E. Dec (January 6, 1926 – January 21, 1996) was an American lawyer and outsider writer who was best known for his typewritten diatribes that he independently mailed and published from the late 1960s onward. His works are characterized by highly accusatory and vulgar attacks on various subjects, often making use of phrases like “Mad Deadly Worldwide Communist Gangster Computer God” to slander hierarchies that he believed were engaging in electronic harassment against him.
Here’s a sample of his… work… 🤯
Decided I needed to have a place for random, dumb junk. And I’ll keep BytesTemplar.com specific to projects and coding.
I’ve taken this opportunity to explore other flat-file CMS..es…CMSes… (🤔)
I migrated BT.com from WordPress to Grav at the start of the year. It’s not bad, and at the time I was quite pleased with it… until I uploaded it to my shared Dreamhost account. Despite not using MySQL, and despite being a simple ‘drop in and go’ system, it still had these absolutely weird moments of slowness. Pages would take 3-5 seconds to load. Same for the admin.
This didn’t happen on my development VM. It was a bit of a surprise.
I spent hours trying to debug the issue, but eventually I had to just concede that it was some mysterious Dreamhost magic getting in the way, and let it be.
So, this week I took a look at some others, and this time I’d install it on Dreamhost first to see how it performs. And, long story shorter: Bludit did the job. Fast, uses a clean WYSIWYG editor, but you can also flip over to Markdown. Feels mostly solid, and has a decent backup plugin.
The downsides are that there isn’t really an easy to use plugin/theme system. And one of the plugins is broken so badly that it ate a lengthy post I’d written because I saved without a post title… Thankfully it’s a completely unnecessary one that I quickly jettisoned once I realized it was a bug in the plugin, not the CMS.
So, got all this setup in an evening. Manually moved over some goofier posts from BT.com.
I feel like I’m spreading my interests thin — BT for generic development? This for random junk? Another blog (elsewhere) for infosec?
I don’t know what the hell I’m thinking. I need to clean this up and unify.