Random thought about the CE code from a few pages back. (Whatever it was; 0286 or something?) The letter between C and E in the alphabet is D. That’s a tenuous connection, but that number might be Code D.
Another polite reminder that we are all on IRC at #BMS-ARG on quakenet. You can access it through this site: https://webchat.quakenet.org
So Stone worked on the game? I don’t know but probally he have been murdered, since there’s blood close to his name on the plaque on QE. Or he’s the murder…
i really don’t think so, given the amount of the pizza is a lie writings next to QE symbols scattered around the entire game, i am more inclined to believe the arg takes place entirely in the QE chapter.
by the way, did everybody miss my post about bruteforcing the urls?
He doesn’t have an office or a picture, the other 3 on the plaque do.
That’s considered cheating, but it’s not like we can’t do it. It’s just that I won’t. Probably the same with the others.
dalsystems.com is an alternate URL (registered through an anonymiser) for dalsystems.homeserver.com
The SSL is valid but it’s linked to dalsystems.homeserver.com so displays errors when you access the page from dalsystems.com
It’s a windows home server linked to the url through https://dyn.com/
The only other place I think we can find something is Anomalous Material since OBA worked on it extensively. Check the whiteboards again.
Yeah. There were a ton of offices all around that map, seems like a good place to look.
Well, I got it to DRHORN, so it’s probably just a reference, like the flashing letters at the old verision of aperturescience.com forming THECAKEISALIE.
yes but I don’t think anybody wants to try 1000 combinations
The messege on https://terminal.blackmesasource.com contains DR HORN text typed in capital letters, however only four letters are typed bold: DORN - that may be some clue
Edit: never mind.
I was thinking about the self signed certificate you get when you enter dalsystems.com…
Since there is a reference to RSA and a few ciphers on one of the whiteboards, maybe you can use the certificate for something else? (Like SSH into terminal.blackmesasource.com?)
nah, the SSH is from godaddy; the only reason there’s an error is because the URL the SSH is for is different to the url you’re viewing it at.
Hi Guys,
Been following the mod for years but only lurked on the forums all this time.
Also I’ve been following the progress of this ARG and I have now started replaying to game to check for anything extra.
I just want to say well done to everyone so far who have contributed to this post/ARG to unlock the ARGs secrets.
I noticed in the https://terminal.blackmesasource.com/ page with D O R N highlighted, maybe these letters correspond to ther respective numbers in the alphabet?
I will continue to search for anything in game and hope I can help in anyway I can.
Cheers
Oh, before I forget it, I’ve still not managed to connect to it, but terminal.blackmesasource.com has an open SSH port.
EDIT3:
IMPORTANT: Not ARG related, as the admin rm249 told us.
EDIT: I can’t even access the terminal page anymore (though it seems it’s still up) so that might be the reason.
Anyway, here’s the nmap report:
[code]Starting Nmap 6.01 ( https://nmap.org ) at 2012-09-20 15:59 BRT
NSE: Loaded 93 scripts for scanning.
NSE: Script Pre-scanning.
Initiating Parallel DNS resolution of 1 host. at 15:59
Completed Parallel DNS resolution of 1 host. at 15:59, 0.14s elapsed
Initiating SYN Stealth Scan at 15:59
Scanning terminal.blackmesasource.com (64.15.147.56) [1000 ports]
Discovered open port 80/tcp on 64.15.147.56
Discovered open port 37/tcp on 64.15.147.56
Completed SYN Stealth Scan at 15:59, 7.84s elapsed (1000 total ports)
Initiating Service scan at 15:59
Scanning 2 services on terminal.blackmesasource.com (64.15.147.56)
Completed Service scan at 15:59, 6.34s elapsed (2 services on 1 host)
Initiating OS detection (try #1) against terminal.blackmesasource.com (64.15.147.56)
Retrying OS detection (try #2) against terminal.blackmesasource.com (64.15.147.56)
Initiating Traceroute at 15:59
Completed Traceroute at 15:59, 6.23s elapsed
Initiating Parallel DNS resolution of 11 hosts. at 15:59
Completed Parallel DNS resolution of 11 hosts. at 15:59, 8.89s elapsed
NSE: Script scanning 64.15.147.56.
Initiating NSE at 15:59
NSE Timing: About 50.00% done; ETC: 16:00 (0:00:31 remaining)
Completed NSE at 16:02, 144.42s elapsed
Nmap scan report for terminal.blackmesasource.com (64.15.147.56)
Host is up (0.17s latency).
rDNS record for 64.15.147.56: gman.blackmesasource.com
Not shown: 986 filtered ports
PORT STATE SERVICE VERSION
20/tcp closed ftp-data
21/tcp closed ftp
22/tcp closed ssh
25/tcp closed smtp
37/tcp open ssh OpenSSH 5.3 (protocol 2.0)
53/tcp closed domain
80/tcp open http nginx
110/tcp closed pop3
143/tcp closed imap
443/tcp closed https
465/tcp closed smtps
587/tcp closed submission
993/tcp closed imaps
995/tcp closed pop3s
Device type: general purpose|WAP|firewall
Running (JUST GUESSING): Linux 3.X|2.6.X|2.4.X (94%), FreeBSD 6.X (86%), Fortinet Linux 2.6.X (85%)
OS CPE: cpe:/o:linux:kernel:3 cpe:/o:linux:kernel:2.6.32 cpe:/o:freebsd:freebsd:6.2 cpe:/o:linux:kernel:2.4 cpe:/o:fortinet:linux:2.6
Aggressive OS guesses: Linux 3.0 (94%), Linux 2.6.32 - 2.6.35 (92%), Linux 2.6.32 - 2.6.38 (92%), Linux 2.6.38 (91%), Linux 2.6.39 (90%), Linux 2.6.18 (89%), Linux 2.6.34 (88%), Linux 2.6.32 - 2.6.33 (87%), Linux 2.6.9 - 2.6.27 (87%), Linux 2.6.35 (87%)
No exact OS matches for host (test conditions non-ideal).
NSE: Script Post-scanning.
Read data files from: /usr/local/bin/…/share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 182.38 seconds
Raw packets sent: 2167 (100.162KB) | Rcvd: 61 (3.552KB)[/code]
EDIT2: https://webcache.googleusercontent.com/search?q=cache:https://terminal.blackmesasource.com/ currently gives:
Using username "bmesaroot".
Error: Client IP address not found in \allow\ iptable for this location.
Goodbye.
:zip:
you sir are a cheating bastartd creaing sites with stormseekers name under your ip tell us more
He’s here! CLOSE ALL THE EXISTS, I’LL GET THE ROPE!