what kind of encoding is this? does anyone know? [closed] - decode

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 2 years ago.
Improve this question
Does anyone know what this kind of encoding is called? and how can it be decoded?
7b22 6669 6c65 7322 3a7b 2270 6163 6b61
6765 2e6a 736f 6e22 3a7b 2273 697a 6522
3a31 3436 332c 226f 6666 7365 7422 3a22
3022 7d2c 2264 6973 7422 3a7b 2266 696c
6573 223a 7b22 656c 6563 7472 6f6e 223a
7b22 6669 6c65 7322 3a7b 2261 7574 682e
6874 6d6c 223a 7b22 7369 7a65 223a 3337
3731 2c22 6f66 6673 6574 223a 2231 3436

{"files":{"package.json":{"size":1463,"offset":"0"},"dist":{"files":{"electron":{"files":{"auth.html":{"size":3771,"offset":"146
A plain text json spelled as hex out of ASCII strict 7bit presented in 2 byte grouping

Related

Is there a cipher method that uses 9 digit(starts with 8,9 or else) and 10 digit(only starts with 1) [closed]

Closed. This question is not about programming or software development. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 5 days ago.
Improve this question
1752462448 1933193007 1667526190 1684632419 1869767777 1886400099 1869426529 1953784163 1751999854 1953705777 808924214 943272760 825768241 858992688 876162865 808924214 959918133 892810033 825832761 808726350 1162236485 1412330081 1912602624 there is the cipher.
i tried dcode.fr Cipher Identifier and it says this is base36. yes i found something with it like a another cipher. i tried to decode it too but got nothing.
Example in Python for its universal intelligibility:
c = '1752462448 1933193007 1667526190 1684632419 1869767777 1886400099 1869426529 1953784163 1751999854 1953705777 808924214 943272760 825768241 858992688 876162865 808924214 959918133 892810033 825832761 808726350 1162236485 1412330081 1912602624'
b = [bytes.fromhex(
f'{int(a):08x}').decode() for a in c.split()]
print(''.join(b).rstrip('\x00'))
https://cdn.discordapp.com/attachments/1074689381891330049/1074697055731195904/NEFRET.rar
Note that b is the following list (with the last element 'r\x00\x00\x00'):
['http', 's://', 'cdn.', 'disc', 'orda', 'pp.c', 'om/a', 'ttac', 'hmen', 'ts/1', '0746', '8938', '1891', '3300', '49/1', '0746', '9705', '5731', '1959', '04/N', 'EFRE', 'T.ra', 'r\x00\x00\x00']
Therefore, wee need to remove all trailing ␀ (U+0000, Null) characters (see .rstrip('\x00') in the last line of above code snippet).

Concat string into file [closed]

Closed. This question is not reproducible or was caused by typos. It is not currently accepting answers.
This question was caused by a typo or a problem that can no longer be reproduced. While similar questions may be on-topic here, this one was resolved in a way less likely to help future readers.
Closed 8 years ago.
Improve this question
I have a file with the following content (I placed 3 lines for example):
12743002785468 |MOVIL APPLE IPHONE4 16GB BLANCO |NVEN |Centro de Atención VIP |0862034032
12747002147595 |MOVIL APPLE IPHONE4 16GB BLANCO |NVEN |Centro de Atención VIP |0862033996
I have a variable date (20140430) I want to concatenate the beginning of each record like this:
20140430|12743002785468 |MOVIL APPLE IPHONE4 16GB BLANCO |NVEN |Centro de Atención VIP |0862034032
20140430|12747002147595 |MOVIL APPLE IPHONE4 16GB BLANCO |NVEN |Centro de Atención VIP |0862033996
I tried to use this:
cat /home/file.txt | awk '{print "'"20140430"'""|"$0;}' > /home/file.txt
and
sed -i 's/^/20140430|/' /home/file.txt > /home/file.txt
But not work and i could not do that to my file of 180,000 records. Anyone have another idea how I can concatenate? The operating system is SunOS 5.11 sun4v sparc sun4v 11.1
Thank you very much in advance
You can also loop and append:
while read line; do
echo 20140430'|'$line
done < /home/file.txt > /home/file.txt.tmp
mv file.txt.tmp file.txt

Why does fread read URLs ok on Linux but not on Windows (prior to 1.9.3)?

I am trying to read in a csv from the net. When I run
library(data.table)
rawfile<-fread("http://www.pjm.com/pub/account/genoutages/20140116_genout.csv",stringsAsFactors=FALSE,skip=2)
rawfile
I get
Empty data.table (0 rows) of 2 cols: File Posted on 16-Jan-2014 04:00,V2
But if I download the file to my computer first and then do
rawfile<-fread("c:\\temp\\20140116_genout.csv",stringsAsFactors=FALSE,skip=2)
rawfile
then I get the output that I expect.
I know this is easy to work around by I just wanted to see if this was a bug or if there was some nuance that was going over my head.
UPDATE Sep 2014 : Now fixed in v1.9.3
URLs now work on Windows. R's download.file() converts \r\n to \r\r\n on Windows. Now avoided by downloading in binary mode. Thanks to Steve Miller and Dean MacGregor for reporting, #492.
Thanks for reporting. It worked fine for me when I tried just now on Linux. See output below.
?fread confirms that URLs are supported: "A filename input is passed through path.expand for convenience and may be a URL starting http:// or file://."
Given the comments, seems like a Windows only problem then. Have raised a bug here :
#5288 fread reads URLs on Linux but not Windows?
Here's the output from it working on Linux :
fread("http://www.pjm.com/pub/account/genoutages/20140116_genout.csv",stringsAsFactors=FALSE,skip=2)
trying URL 'http://www.pjm.com/pub/account/genoutages/20140116_genout.csv'
Content type 'application/octet-stream' length 2767 bytes
opened URL
==================================================
downloaded 2767 bytes
Date Forecasted Generation Outage Western Region Other Regions
1: 1/17/2014 1543 374 1169
2: 1/18/2014 1520 374 1146
3: 1/19/2014 1520 374 1146
4: 1/20/2014 1520 374 1146
5: 1/21/2014 1520 374 1146
6: 1/22/2014 1520 374 1146
7: 1/23/2014 1506 374 1132
.. snip

ASP.NET Memory Leak - OracleCommand Object

I have a memory leak and I am having a really hard time trying to figure out where the problem is. The ASP.NET process is raising to 1GB every now and then. I have followed the instructions on this page (http://humblecoder.co.uk/tag/windbg) and the !gcroot command returns the following (last x lines). I have looked at all my OracleConnections and OracleCommands and they appear to be closed and disposed correctly:
6523dfd4 282 28200 System.Data.SqlClient.SqlParameter
0e90d850 548 28496 System.IO.MemoryStream
67b71a0c 1461 29220 System.Transactions.SafeIUnknown
7a5ee588 1924 30784 System.Collections.Specialized.ListDictionary+NodeKeyValueCollection
648c91f4 665 31920 System.Configuration.ConfigurationValues
7a5e5d04 1342 32208 System.Threading.Semaphore
652410f8 670 34840 System.Data.ProviderBase.DbConnectionPool+PoolWaitHandles
6613228c 1319 36932 System.Web.Security.FileSecurityDescriptorWrapper
66106948 2449 39184 System.Web.UI.AttributeCollection
0e8ff780 2021 40420 Microsoft.Win32.SafeHandles.SafeLsaPolicyHandle
01e34730 336 43008 Oracle.DataAccess.Client.OracleDataReader
648c9434 2218 44360 System.Configuration.ConfigurationValue
7a5ea0e4 1918 46032 System.Collections.Specialized.ListDictionary+NodeKeyValueCollection+NodeKeyValueEnumerator
7a5eaaa8 3088 49408 System.Collections.Specialized.NameObjectCollectionBase+NameObjectEntry
652435c4 1138 59176 System.Data.SqlClient.SqlBuffer
0e912c9c 2491 59784 System.Collections.ArrayList
0e9132c0 1236 69216 System.Collections.Hashtable
6614bf64 45 69660 System.Web.Caching.ExpiresEntry[]
0e8ff7d8 4042 80840 Microsoft.Win32.SafeHandles.SafeLsaMemoryHandle
66105ff4 5434 86944 System.Web.UI.StateBag
01e364c8 5686 90976 Oracle.DataAccess.Client.OpoSqlValTimeoutCtx
0e912e08 1007 91556 System.Int32[]
7a5ee300 3942 94608 System.Collections.Specialized.ListDictionary+NodeEnumerator
01e35ef8 7918 95016 Oracle.DataAccess.Client.OpoSqlRefCtx
01e353bc 6043 96688 Oracle.DataAccess.Client.MetaData
0e8f83e8 5017 100340 Microsoft.Win32.SafeHandles.SafeLocalAllocHandle
7a5ef738 6284 125680 System.Collections.Specialized.HybridDictionary
7a5ef7f4 5143 144004 System.Collections.Specialized.ListDictionary
661060d0 10908 174528 System.Web.UI.StateItem
0e91189c 533 184492 System.Char[]
6610d15c 2426 203784 System.Web.UI.WebControls.TableCell
01e362ec 7918 221704 Oracle.DataAccess.Client.OracleXmlQueryProperties
7a5ef8b4 11231 224620 System.Collections.Specialized.ListDictionary+DictionaryNode
65242390 1814 232192 System.Data.SqlClient._SqlMetaData
0e8f832c 12124 242480 Microsoft.Win32.SafeHandles.SafeTokenHandle
01e36444 7918 253376 Oracle.DataAccess.Client.OracleXmlSaveProperties
0e8f7ca8 13394 267880 Microsoft.Win32.SafeHandles.SafeWaitHandle
0e9133bc 1255 267912 System.Collections.Hashtable+bucket[]
0e8f7a98 12048 289152 System.Threading.ManualResetEvent
0e8e443c 7886 385508 System.Object[]
01e34b60 6456 387360 Oracle.DataAccess.Client.OpoConRefCtx
01e33860 6432 668928 Oracle.DataAccess.Client.OracleConnection
01e34f9c 6439 824192 Oracle.DataAccess.Client.OpoConCtx
01e34038 7918 1171864 Oracle.DataAccess.Client.OracleCommand
000dfbe0 70 5839608 Free
0e9136dc 2622 17492932 System.Byte[]
0e910c6c 56049 19472876 System.String
Total 283875 objects
If mem usage drops to 200 MB after a time, this shows your memory is beeing collected, but you still might have a memory missuse issue.
this dump doesn't show alot, but if it was taken when the process is 1GB as you said, you can still use it:
1) use !gcroot on several objects, to see how they are attached to the memory (i would check the DB usage, it seems you have a large amount of oracle connections (6432), and alot of other DB stuff floating around.)
like this:
!dumpheap -MT <mt = the left most number>
objects will show with memory addresses
!gcroot <address>
an object stack will show displaying how the object is attached to the memory tree.
a sample of this process
2) check performance counters (start->run->perfmon) add these counters:
- .Net Clr Memory-> #bytes all heaps
- Process->private bytes
calculate the difference between them - this is the memory consumed by unmanaged resources (like DB client objects)
check this in low memory and in high memory scenarios, and you will see if the memory consumption is mostly due to Managed memory (all heaps) or unmanaged.
3) if the memory is unmanaged, it's still likely to be held by managed objects, as the main application is managed, so making sure you free unmanaged resources after you are done with them is key. (close DBConnections, dispose DBCommands, close file handles, free COMObjects etc.)
Hope this helps,
Amit.

tcpdump vs tcpflow (or "why isn't tcpdump ASCII packet data human readable?")

I have used both, and I conclude that I can read html data from webpages with tcpflow but cannot do so with tcpdump. The best I get is some ugly ASCII text with lots of period symbols.
My understanding is that tcpdump doesn't reassemble packets, whereas tcpflow does. But if that was the key difference, wouldn't the packet data from tcpdump still be human readable - just in smaller chunks? Is the problem that tcpdump is limited to ASCII and most network traffic is encoded in UTF-8?
I'm a rookie on network analysis/programming so forgive me if I'm missing something obvious.
To get that encrypted data one should use tcpdump with option tcpdump –A (capital a). It transfers text without any headers and is used mainly for web pages. Hence we get response page easily.
I think you are getting confused between an application layer and transport layer packet.
I do not know about tcpflow but tcpdump capture the whole packet (including header and all other stuff) not just the data.The html data which you are mentioning would be in the data part of a tcp/udp/icmp packet whichever you are using and so it needs you to understand the structure of tcp/udp/icmp packet as well ...
I capture this packet on my machine and HTML data is clearly visible , you need to write script to get it from the output with a knowledge of packet structure.
16:15:17.968325 IP 172.31.9.84.80 > 172.31.9.177.56559: P 2575928381:2575928808(427)
ack 65285447 win 1716 <nop,nop,timestamp 21031622 15165633>
0x0000: 4500 01df 66fd 4000 4006 66d8 ac1f 0954 E...f.#.#.f....T
0x0010: ac1f 09b1 0050 dcef 9989 8c3d 03e4 2d47 ..... P.....=..-G
0x0020: 8018 06b4 1a2a 0000 0101 080a 0140 eac6 .....*.......#..
0x0030: 00e7 68c1 4854 5450 2f31 2e31 2032 3030 ..h.HTTP/1.1.200
0x0040: 204f 4b0d 0a44 6174 653a 2046 7269 2c20 .OK..Date:.Fri,.
0x0050: 3130 204a 756c 2032 3030 3920 3130 3a32 10.Jul.2009.10:2
0x0060: 303a 3136 2047 4d54 0d0a 5365 7276 6572 0:16.GMT..Server
0x0070: 3a20 4170 6163 6865 2f32 2e30 2e35 3220 :.Apache/2.0.52.
0x0080: 2852 6564 2048 6174 290d 0a4c 6173 742d (Red.Hat)..Last-
0x0090: 4d6f 6469 6669 6564 3a20 4672 692c 2031 Modified:.Fri,.1
0x00a0: 3020 4a75 6c20 3230 3039 2030 393a 3331 0.Jul.2009.09:31
0x00b0: 3a30 3420 474d 540d 0a45 5461 673a 2022 :04.GMT..ETag:."
0x00c0: 3266 6231 3333 2d37 372d 6131 3935 3436 2fb133-77-a19546
0x00d0: 3030 220d 0a41 6363 6570 742d 5261 6e67 00"..Accept-Rang
0x00e0: 6573 3a20 6279 7465 730d 0a43 6f6e 7465 es:.bytes..Conte
0x00f0: 6e74 2d4c 656e 6774 683a 2031 3139 0d0a nt-Length:.119..
0x0100: 4b65 6570 2d41 6c69 7665 3a20 7469 6d65 Keep-Alive:.time
0x0110: 6f75 743d 3135 2c20 6d61 783d 3130 300d out=15,.max=100.
0x0120: 0a43 6f6e 6e65 6374 696f 6e3a 204b 6565 .Connection:.Kee
0x0130: 702d 416c 6976 650d 0a43 6f6e 7465 6e74 p-Alive..Content
0x0140: 2d54 7970 653a 2074 6578 742f 6874 6d6c -Type:.text/html
0x0150: 3b20 6368 6172 7365 743d 4953 4f2d 3838 ;.charset=ISO-88
0x0160: 3539 2d31 0d0a 0d0a 3c68 746d 6c3e 0a0a 59-1....<html>..
0x0170: 3c62 6f64 793e 0a49 6e64 6961 6e20 696e <body>.Indian.in
0x0180: 7374 6974 7574 6520 6f66 2074 6563 686e stitute.of.techn
0x0190: 6f6c 6f67 7920 2e2e 2e2e 2e20 7468 6973 ology.......this
0x01a0: 2069 7320 7468 6520 7465 7374 2070 6167 .is.the.test.pag
0x01b0: 652e 0a3c 4120 6872 6566 3d22 6164 2e68 e..<A.href="ad.h
0x01c0: 746d 6c22 3e61 6263 643c 2f41 3e0a 0a3c tml">abcd</A>..<
0x01d0: 2f62 6f64 793e 0a3c 2f68 746d 6c3e 0a /body>.</html>.
The last 7-8 lines describe the html data.
use -s0 to capture whole frame and -X to print in above ASCII human readable format.
To get that encrypted data one should use TCPDUMP with option –A (capital a). It transfers text without any headers and is used mainly for web pages. Hence we get response page easily.
For eg:
I request index.html to 172.31.9.84 at port 80
Then I requested GET/index.html (an example page that contains only text “Indian institute of technology this is the test page”)
At this moment when I captured packets I got something as:
Request:
18:10:42.387426 IP 172.31.9.177.42943 > 172.31.9.84.80:
P 1:15(14) ack 1 win 46 <nop,nop,timestamp 6644101 353753635>
E..B.G#.#........T...P^R.Mb.L.....ke.....
.ea....#GET /index.html
Response:
18:10:42.388127 IP 172.31.9.84.80 > 172.31.9.177.42943: P 1:53(52)
ack 15 win 1448 <nop,nop,timestamp 353758368 6644101>
E..h..#.#.8m..T.. ..P..b.L.^R.[....d......
.....ea.<html>
<body>
Indian institute of technology this is the test page
</body>
</html>
When trying to get HTTP data using tcpdump, you will see clear text in ASCII if you apply the -A option. However, a HTTP data is almost always compressed with gzip mode or other. You can see it in headers:
Content-Encoding: gzip, compress, bzip2
Thus, tcpdump will output in your screen several bytes and they are the compressed data!!! You will need to use tshark or wireshark to see flat data. Then your problem isn't UTF8.
You can test tcpdump data display disabling deflate module in Apache web server.
Hope this help.

Resources