I don’t think it would work, the B key doesn’t even have a function and I don’t think they gave it one. Also, probably not relevant, but there’s a keypad with a combination of arrow keys in Lambda core. No, not the konami code. You can’t press them and there are several others like it, so it probably means nothing.
var code = [], lulz = “38,38,40,40,37,39,37,39,66,65”;
$(document).keydown(function(e) {
code.push( e.keyCode );
if ( code.toString().indexOf( lulz ) >= 0 ){
$(document).unbind(‘keydown’,arguments.callee);
window.open(‘https://terminal.blackmesasource.com’)
window.focus();
That’s the code used on the site.
38 = UP; 40 = DOWN; 37 = LEFT; 39 = RIGHT; 66 = B; 65 = A.
so the only things the site responds too are those inputs. (as of right now atleast)
And since the only same number being 39 (in code C),
there isn’t possibly anything on this site we can do with the end code.
view-source:https://www.thestormseeker.com/
If you want to checkout the source yourselves.
and here’s the Konami code page:
That’s not true, he can always update the site. That probably will be the case with the Terminal, anyway, since it would be a waste of a page to use it only for that.
fix’d.
Nice one, KONAMI code worked well
I still think that it’s just a hidden webpage. It’s entirely possible to do if there aren’t any links to it, since it can’t be found from search engines that way.
Not true, it’s possible to bruteforce links. I have even experienced that being done in Flynn Lives, if I’m not mistaken (of course the link was later properly discovered). That’s why they usually have random strings as the address (unlike “hidden” haha).
EDIT: You talked about search engines, so it could be true to be infeasible. My point holds, though.
Does BMRFpass (BWRFpass?) mean anything? If you zoom in on a few of the malfunctioning keypads in QE (Like the one in Dr. Horn’s office, only broken) at the right time, you can catch a username.
Hmm. I think I saw that on another keypad in AM, it seems to just be a placeholder from lazy texturing. There are plenty of spelling errors on textures in QE, too…
…Or are there? Hm. New idea, look for spelling errors and things on machinery and screens.
Found this whiteboard in the small room where you can see G-man in QE (Where you also find the crossbow. I dont know if anyone has posted this earlier.
The board has a Pie chart where “Pizza rations” are mentioned.
“Anthony stop stealing my Pizzas”
Also has a chart where the result [Code] has a comment in red “Please use Cascade chiphers only (eg. 14es 12t 1sp ) 1024 bit key (RSA) or 2048”
the OMG HAI page is a custom 404 page i believe, it has nothing to do with the word “hidden”, try any random word and you will see it
since the terminal page has no javascript inside, maybe the combination of the abcd codes has to be put in the path
now, assuming we have the first 3 codes right, we can try
https://terminal.blackmesasource.com/100108513914xxxx
or
https://www.thestormseeker.com/100108513914xxxx
someone is willing to bruteforce it? there are merely 10000 combinations
I had noticed that before I found out about the ARG, but I immediately dismissed it because we were given the username, not the password. It could be of use in the future (if we are ever given a login prompt), but right now, not the case.
That is mentioned in the first post as “Talk of ciphers on a whiteboard in QE.”. And it is “(eg. 1AES 12F 1SP)”, referring to the Advanced Encryption Standard, TwoFish and Serpent algorithms. We are pretty sure now it has no relation to the ARG, though.
Hadn’t accessed that before. Looks like it! The password is probably the abcd code, though.
EDIT: Ops, forgot to edit last post instead.
…Damnit, I found that page earlier, but dismissed it as irrelevant.
unlikely
https://whois.domaintools.com/dalsystems.com
does anybody know how to do what i suggested on my last post?
The passaword has 6 letters, the only words that came to my mind that have 6 letters and are from the ARG are Bonami and Konami. I don’t know, but for me i think there’s something related with Konami code
A whois reveals it was registered under an anonomiser, and that it was last updated about a month ago.
We seem to have been doing this a lot lately.