0xdb8592dc3780c3fab55e3709f32dd7efa9f5b1a8ed94d8a00c761293b4409caf
... the above-written contract. Seen here on Etherscan
- StegOnline - upload a file and see if it contains any hidden data
- StegCracker - upload a file and see if it contains any hidden data
- Aperi'Solve - upload a file and it will analyze it with a crapload of commono stego tools
Image1: 00000001.jpg
Relevant analysis: https://www.aperisolve.com/bb44b8fefc2de231fc5d3082bccf1532
Interesting findings:
b1,rgba,lsb,xy .. text: ["U" repeated 11 times]
b1,abgr,msb,xy .. text: ["U" repeated 11 times]
b2,r,lsb,xy .. text: "UUjUUUjU@U:"
b2,g,lsb,xy .. text: "UUUUUUUUUj"
b2,g,msb,xy .. text: ["U" repeated 8 times]
b2,b,lsb,xy .. text: "UUjUUUjU@"
b2,rgba,lsb,xy .. text: ";;wwwwww"
b2,abgr,msb,xy .. text: ["w" repeated 8 times]
b3,rgba,lsb,xy .. text: "VugVugVugz"
b4,r,lsb,xy .. text: ["w" repeated 10 times]
b4,r,msb,xy .. text: "333UUUUUUUU"
b4,g,lsb,xy .. text: "DUUUfffwwww"
b4,g,msb,xy .. text: ["D" repeated 10 times]
b4,b,lsb,xy .. text: "\"\"\"\"33\"\""
b4,b,msb,xy .. text: ["w" repeated 11 times]
b4,abgr,msb,xy .. text: "?Z?Z?Z?Z?Z?Z"
Image2: 00000002.jpg
Relevant analysis: https://www.aperisolve.com/b4752b5b3f04bf68543e1f6215432287
If you are interested in analyzing anything on the contract/programmatic level, go # (for free, no credit card required, just login with GitHub or Google Account & start a 14-day trial) for Tenderly. Here's a quick example of what you can see (one of the relevant transactions as of about 6 minutes ago time of writing) https://dashboard.tenderly.co/tx/mainnet/0xcfd628c02140695403a650c7bd1657bb8594bdf8a949a6c6c8ea8b5facf0484d
CUT-TO .. some more stuff
Check ./snippets/plausible-answer-1.txt
Markdown README for snippets: ./snippets/README.md
... nvm, making a markdown readme. Sorry for messy insane notes :)
Oh yeah and this (compare to image, kinda obv. but took me a min 🧙♂️
./sol/codesnaps/Ingredient.sol.png
Other tools:
- CyberChef - a swiss army knife of tools for analyzing data
- https://www.4byte.directory/
Fun fact: Amazon CodeWhisperer is contributing via autofill to this README.md file. I'm not sure if it's a bug or a feature, but it's pretty cool. (it just wrote the entire last half of that sentence... and called itself cool. I'm not sure if I agree with that, but it's pretty cool.)
{
"[FUNCTION]": "isContract",
"[OPCODE]": "JUMP",
"contract": {
"address": "0xd9c97a1af6b6689e49be1a5afa895114f843bd28"
},
"caller": {
"address": "0x0aa607779b8395e5ccc4cd9fb2d689e6d3575be5",
"balance": "0"
},
"input": {
"account": "0x30f8b9f0d81a0fd5d26937379c648c8ae8986a35"
},
"output": {
"0": false
},
"gas": {
"gas_left": 3348,
"gas_used": 140,
"total_gas_used": 198754
}
}