-
It seems to have something to do with determining which version of the killer image you get at least. If I turn off cookies and go to the 404 page, I will always get the same version of the image. I first stumbled across this when I was using wget to snag all the files and extract words from the binaries. I always got the "Message to Dana" version of the killer image. I'm not sure if it determines what versions of other pages are displayed. Maybe a way to control the output of the website? --UserJegger 12:54, 4 Aug 2004 (PDT)
-
Were you successful in using wget? Whenever I use wget or curl, I always get the same version of killer.jpg (md5sum starts with 5386). I've tried spoofing the cookie, the referer, the user-agent, and my own IP. I have no idea how the server knows it's not my usual web browser. --UserZudini 13:24, 4 Aug 2004 (PDT)
-
I was not successful, but it definitely has to do with cookies. My test was as follows using Firefox: Had cookies on. Reloaded 404 and got varying images. Made sure that the loaded image was not 5386. Turned off cookies. Reloaded and got 5386. Continued reloading and continued to get 5386. I have a feeling that it reads the cookie from the previous page load. That way the cookie would have to be persistent, which wget doesn't do by default. I'll investigate further and post again. --UserJegger 14:02, 4 Aug 2004 (PDT)
-
I tried storing and reloading the cookies every wget, but the cookies file seems to remain empty. I haven't done much with wget before. Any thoughts on getting the cookies to stick?--UserJegger 13:31, 5 Aug 2004 (PDT)
-
According to the man page, wget does not store cookies which have no expiry dates. ilovebees.com does not deign to have its cookies expire. You can use HttpCurlHaxxSeCURL to store the cookies, though. (I've still had no luck with actually getting a varying killer.jpg image.) --UserZudini 17:36, 5 Aug 2004 (PDT)
-
Update: I have now had some success using cURL to get different killer.jpg images. I was able to do it without spoofing the Referer, User-Agent, or Host IP. In fact my request had only GET, Host:, Connection:, and Cookie:. However, it's still not working quite right....
-
I can now get the varying killer.jpg images using wget. I had to load and store the cookies in a file, and wget http://www.ilovebees.com/bvsdfdv. This returns the varying killer images. Just requesting the .jpg isn't good enough
-
if it's a session based cookie it might be easiest to use Mozilla or FireFox to view the cookie in it's manager while you browsing the site. --UserGunsmithCat 13:55, 5 Aug 2004 (PDT)
-
It would be a more controlled method of displaying certain pages more randomly/after/etc than others than simply randomizing it completely on the backend. --UserGunsmithCat 13:39, 4 Aug 2004 (PDT)
%telnet www.ilovebees.com 80 Trying 69.20.126.147... Connected to www.ilovebees.com. Escape character is '^]'. GET / HTTP/1.1 200 OK Date: Tue, 03 Aug 2004 22:58:27 GMT Server: Apache/1.3.19 (Unix) (Red-Hat/Linux) mod_ssl/2.8.1 OpenSSL/0.9.6 DAV/1.0.2 PHP/4.0.4pl1 mod_perl/1.24_01 '''Set-Cookie: y1dt8hx=j1taxfJ5dov2krqufxhiypJ5; path=/''' Cache-Control: max-age=0 Last-Modified: Tue, 03 Aug 2004 22:58:26 GMT Content-Type: text/html; charset=utf-8
%telnet www.ilovebees.com 80 Trying 69.20.126.147... Connected to www.ilovebees.com. Escape character is '^]'. GET /about.html HTTP/1.1 200 OK Date: Tue, 03 Aug 2004 23:00:27 GMT Server: Apache/1.3.19 (Unix) (Red-Hat/Linux) mod_ssl/2.8.1 OpenSSL/0.9.6 DAV/1.0.2 PHP/4.0.4pl1 mod_perl/1.24_01 '''Set-Cookie: y1dt8hx=5kpjnbjkkkdmq1J5zwa1qt55; path=/''' Cache-Control: max-age=0 Last-Modified: Tue, 03 Aug 2004 23:00:26 GMT Content-Type: text/html; charset=utf-8
%telnet www.ilovebees.com 80 Trying 69.20.126.147... Connected to www.ilovebees.com. Escape character is '^]'. GET /pleasegivemea404.html HTTP/1.1 404 Not Found Date: Tue, 03 Aug 2004 23:03:56 GMT Server: Apache/1.3.19 (Unix) (Red-Hat/Linux) mod_ssl/2.8.1 OpenSSL/0.9.6 DAV/1.0.2 PHP/4.0.4pl1 mod_perl/1.24_01 '''Set-Cookie: y1dt8hx=i5kfwvJ5czgqkiaszcfrmwmJ; path=/''' Cache-Control: private Content-Type: text/html
ilovebees cookie: ayz1pnJ5kkjml.55cmfzbzJ5 wiki session cookie: 7b19d5dcc3f7e86e20b5745c9c7de694Looks like its not a session key. Could be a serialized data structure though.--UserCompnski
That isn't necessarily not a session key. The wiki session cookie is hexadecimal, while the ilovebees cookie appears to be in base64. The encoding is different but the data could be of entirely the same nature. --Kaelan
