minify
This commit is contained in:
parent
31d5483954
commit
f748dd1361
Binary file not shown.
|
Before Width: | Height: | Size: 240 KiB |
@ -30,18 +30,8 @@
|
||||
|
||||
<div id="messege">
|
||||
|
||||
<p>Several months ago, your loved one Katlyen Hicks went missing. You have connections
|
||||
do several deep and dark web users. They have informed you that they ave seen websites known for human
|
||||
trafficing that have posted advertisements with her picture. These websites are only accessible by using
|
||||
the T.O.R network. A network designed to mask origins of internet conections to keep communications hidden.
|
||||
Like any system, it has its weak points. These dark web user friends of yours have taught you secrets of
|
||||
the trade of computer hacking and tracking. You have now build a tool to help you narrorw down the source
|
||||
of these website owners. The T.O.R. network masks its users by bouncing their signals all accross the globe
|
||||
so much so that they are almost impossible to track. You however are able to track the different network nodes
|
||||
and find the roots of the signals. Your tool will allow you select IP addresses and determine if it is an actual
|
||||
node being used. This tool will let you know how accurate your choice is so you can accuratly make a new selection.
|
||||
You only have so long before you are lockout out of the system's vulnerabilities. Use this toime appropriately, you
|
||||
will need to lock onto several signals to find rthe capture of your loved one.
|
||||
<p>
|
||||
Several months ago, your loved one Katlyen Hicks went missing. You have connections to several deep and dark web users. They have informed you that they have seen websites, known for human trafficking, that have posted advertisements with her picture. These websites are only accessible by using the T.O.R network. A network designed to mask origins of internet connections to keep communications hidden. Like any system, it has its weak points. These dark web user friends of yours have taught you secrets of the trade of computer hacking and tracking. You have now built a tool to help you narrow down the I.P. addresses of these website owners. The T.O.R. network masks its users by bouncing their signals all across the globe so much so that they are almost impossible to track. You however are able to pinpoint the different nodes and find the roots of the signals. Your tool will allow you to select IP addresses and determine if it is a node being used. This tool will let you know how accurate your choice is so you can make a more precise selection to further your tracking. You only have so long before you are locked out of the system's vulnerabilities and only have so many attempts to analyze I.P. addresses as well. Use this time appropriately! You will need to lock onto several signals to find the captor of your loved one. Happy Hunting!
|
||||
</p>
|
||||
|
||||
<button onclick="beginClicked()">BEGIN</button>
|
||||
|
||||
96
index.html
96
index.html
@ -1,95 +1 @@
|
||||
<!DOCTYPE html>
|
||||
<html>
|
||||
|
||||
<head>
|
||||
<title>Lost</title>
|
||||
|
||||
<link rel="stylesheet" href="style.css">
|
||||
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<section class="screen">
|
||||
<h3 id="title">DISPLAY REPORT</h3>
|
||||
<section class="score-wrapper">
|
||||
|
||||
<div class="left">
|
||||
<h3>TRACKING SUCCESS: <span class="green" id="precentage"></span></h3>
|
||||
<h3>QUERY: <span class="green" id="query-name">KATLYEN HICKS</span></h3>
|
||||
</div>
|
||||
|
||||
<div class="right">
|
||||
<h3>BRUTE FORCE LOCKOUT: <span class="green" id="lockout"></span></h3>
|
||||
<h3>TIME LOCKOUT: <span class="green" id="timer"></span>MS</h3>
|
||||
</div>
|
||||
</section>
|
||||
|
||||
<hr>
|
||||
|
||||
<section id="play-wrapper">
|
||||
|
||||
<div id="messege">
|
||||
|
||||
<p>Several months ago, your loved one Katlyen Hicks went missing. You have connections
|
||||
do several deep and dark web users. They have informed you that they ave seen websites known for human
|
||||
trafficing that have posted advertisements with her picture. These websites are only accessible by using
|
||||
the T.O.R network. A network designed to mask origins of internet conections to keep communications hidden.
|
||||
Like any system, it has its weak points. These dark web user friends of yours have taught you secrets of
|
||||
the trade of computer hacking and tracking. You have now build a tool to help you narrorw down the source
|
||||
of these website owners. The T.O.R. network masks its users by bouncing their signals all accross the globe
|
||||
so much so that they are almost impossible to track. You however are able to track the different network nodes
|
||||
and find the roots of the signals. Your tool will allow you select IP addresses and determine if it is an actual
|
||||
node being used. This tool will let you know how accurate your choice is so you can accuratly make a new selection.
|
||||
You only have so long before you are lockout out of the system's vulnerabilities. Use this toime appropriately, you
|
||||
will need to lock onto several signals to find rthe capture of your loved one.
|
||||
</p>
|
||||
|
||||
<button onclick="beginClicked()">BEGIN</button>
|
||||
|
||||
</div>
|
||||
|
||||
<table>
|
||||
<thead>
|
||||
<tr class="green">
|
||||
<th>IP ADDRESS</th>
|
||||
<th>ACTIVE</th>
|
||||
<th>HOST_NAME</th>
|
||||
<th>MACHINE_TYPE</th>
|
||||
<th>LAST_RESPONCE</th>
|
||||
<th>SYSTEM_LOCATION</th>
|
||||
</tr>
|
||||
</thead>
|
||||
|
||||
<tbody id="entry_table">
|
||||
|
||||
</tbody>
|
||||
</table>
|
||||
</section>
|
||||
|
||||
<hr>
|
||||
|
||||
<section class="response-wrapper">
|
||||
<table id="attempted-ips">
|
||||
<thead>
|
||||
<th class="green">ATTEMPTS</th>
|
||||
<th class="green">SHARED CHARS</th>
|
||||
</thead>
|
||||
|
||||
<tbody id="attempts_table">
|
||||
|
||||
</tbody>
|
||||
</table>
|
||||
</section>
|
||||
|
||||
</section>
|
||||
|
||||
|
||||
|
||||
|
||||
</body>
|
||||
|
||||
|
||||
<script src="levenshtein.js"></script>
|
||||
<script src="app.js"></script>
|
||||
|
||||
</html>
|
||||
<!DOCTYPE html><html><head><title>Lost</title><link rel="stylesheet" href="dist/style.css"></head><body> <section class="screen"><h3 id="title">DISPLAY REPORT</h3> <section class="score-wrapper"><div class="left"><h3>TRACKING SUCCESS: <span class="green" id="precentage"></span></h3><h3>QUERY: <span class="green" id="query-name">KATLYEN HICKS</span></h3></div><div class="right"><h3>BRUTE FORCE LOCKOUT: <span class="green" id="lockout"></span></h3><h3>TIME LOCKOUT: <span class="green" id="timer"></span>MS</h3></div> </section><hr> <section id="play-wrapper"><div id="messege"><p> Several months ago, your loved one Katlyen Hicks went missing. You have connections to several deep and dark web users. They have informed you that they have seen websites, known for human trafficking, that have posted advertisements with her picture. These websites are only accessible by using the T.O.R network. A network designed to mask origins of internet connections to keep communications hidden. Like any system, it has its weak points. These dark web user friends of yours have taught you secrets of the trade of computer hacking and tracking. You have now built a tool to help you narrow down the I.P. addresses of these website owners. The T.O.R. network masks its users by bouncing their signals all across the globe so much so that they are almost impossible to track. You however are able to pinpoint the different nodes and find the roots of the signals. Your tool will allow you to select IP addresses and determine if it is a node being used. This tool will let you know how accurate your choice is so you can make a more precise selection to further your tracking. You only have so long before you are locked out of the system's vulnerabilities and only have so many attempts to analyze I.P. addresses as well. Use this time appropriately! You will need to lock onto several signals to find the captor of your loved one. Happy Hunting!</p><button onclick="beginClicked()">BEGIN</button></div><table><thead><tr class="green"><th>IP ADDRESS</th><th>ACTIVE</th><th>HOST_NAME</th><th>MACHINE_TYPE</th><th>LAST_RESPONCE</th><th>SYSTEM_LOCATION</th></tr></thead><tbody id="entry_table"></tbody></table> </section><hr><section class="response-wrapper"><table id="attempted-ips"><thead><th class="green">ATTEMPTS</th><th class="green">SHARED CHARS</th></thead><tbody id="attempts_table"></tbody></table> </section></section></body> <script src="dist/app.js"></script> </html>
|
||||
106
levenshtein.js
106
levenshtein.js
@ -1,106 +0,0 @@
|
||||
(function(root, factory){
|
||||
if (typeof define == 'function' && typeof define.amd == 'object' && define.amd) {
|
||||
define(function(){
|
||||
return factory(root);
|
||||
});
|
||||
} else if (typeof module == 'object' && module && module.exports) {
|
||||
module.exports = factory(root);
|
||||
} else {
|
||||
root.Levenshtein = factory(root);
|
||||
}
|
||||
}(this, function(root){
|
||||
|
||||
function forEach( array, fn ) { var i, length
|
||||
i = -1
|
||||
length = array.length
|
||||
while ( ++i < length )
|
||||
fn( array[ i ], i, array )
|
||||
}
|
||||
|
||||
function map( array, fn ) { var result
|
||||
result = Array( array.length )
|
||||
forEach( array, function ( val, i, array ) {
|
||||
result[i] = fn( val, i, array )
|
||||
})
|
||||
return result
|
||||
}
|
||||
|
||||
function reduce( array, fn, accumulator ) {
|
||||
forEach( array, function( val, i, array ) {
|
||||
accumulator = fn( val, i, array )
|
||||
})
|
||||
return accumulator
|
||||
}
|
||||
|
||||
// Levenshtein distance
|
||||
function Levenshtein( str_m, str_n ) { var previous, current, matrix
|
||||
// Constructor
|
||||
matrix = this._matrix = []
|
||||
|
||||
// Sanity checks
|
||||
if ( str_m == str_n )
|
||||
return this.distance = 0
|
||||
else if ( str_m == '' )
|
||||
return this.distance = str_n.length
|
||||
else if ( str_n == '' )
|
||||
return this.distance = str_m.length
|
||||
else {
|
||||
// Danger Will Robinson
|
||||
previous = [ 0 ]
|
||||
forEach( str_m, function( v, i ) { i++, previous[ i ] = i } )
|
||||
|
||||
matrix[0] = previous
|
||||
forEach( str_n, function( n_val, n_idx ) {
|
||||
current = [ ++n_idx ]
|
||||
forEach( str_m, function( m_val, m_idx ) {
|
||||
m_idx++
|
||||
if ( str_m.charAt( m_idx - 1 ) == str_n.charAt( n_idx - 1 ) )
|
||||
current[ m_idx ] = previous[ m_idx - 1 ]
|
||||
else
|
||||
current[ m_idx ] = Math.min
|
||||
( previous[ m_idx ] + 1 // Deletion
|
||||
, current[ m_idx - 1 ] + 1 // Insertion
|
||||
, previous[ m_idx - 1 ] + 1 // Subtraction
|
||||
)
|
||||
})
|
||||
previous = current
|
||||
matrix[ matrix.length ] = previous
|
||||
})
|
||||
|
||||
return this.distance = current[ current.length - 1 ]
|
||||
}
|
||||
}
|
||||
|
||||
Levenshtein.prototype.toString = Levenshtein.prototype.inspect = function inspect ( no_print ) { var matrix, max, buff, sep, rows
|
||||
matrix = this.getMatrix()
|
||||
max = reduce( matrix,function( m, o ) {
|
||||
return Math.max( m, reduce( o, Math.max, 0 ) )
|
||||
}, 0 )
|
||||
buff = Array( ( max + '' ).length ).join( ' ' )
|
||||
|
||||
sep = []
|
||||
while ( sep.length < (matrix[0] && matrix[0].length || 0) )
|
||||
sep[ sep.length ] = Array( buff.length + 1 ).join( '-' )
|
||||
sep = sep.join( '-+' ) + '-'
|
||||
|
||||
rows = map( matrix, function( row ) { var cells
|
||||
cells = map( row, function( cell ) {
|
||||
return ( buff + cell ).slice( - buff.length )
|
||||
})
|
||||
return cells.join( ' |' ) + ' '
|
||||
})
|
||||
|
||||
return rows.join( "\n" + sep + "\n" )
|
||||
}
|
||||
|
||||
Levenshtein.prototype.getMatrix = function () {
|
||||
return this._matrix.slice()
|
||||
}
|
||||
|
||||
Levenshtein.prototype.valueOf = function() {
|
||||
return this.distance
|
||||
}
|
||||
|
||||
return Levenshtein
|
||||
|
||||
}));
|
||||
Binary file not shown.
147
style.css
147
style.css
@ -1,146 +1 @@
|
||||
.hidden{
|
||||
display: none;
|
||||
}
|
||||
|
||||
.screen{
|
||||
width: 900px;
|
||||
min-height: 800px;
|
||||
margin: 30px auto;
|
||||
border-color: #00FF00;
|
||||
border-width: 1px;
|
||||
border-style: solid;
|
||||
border-radius: 26px;
|
||||
background-color: black;
|
||||
color: white;
|
||||
font-family: monospace;
|
||||
overflow: hidden;
|
||||
}
|
||||
|
||||
#messege{
|
||||
height: 560px;
|
||||
text-transform: uppercase;
|
||||
font-size: 16px;
|
||||
}
|
||||
|
||||
button{
|
||||
padding: 10px 25px;
|
||||
color: black;
|
||||
background-color: #00FF00;
|
||||
border-width: 1px;
|
||||
border-style: none;
|
||||
border-bottom-style: solid;
|
||||
border-radius: 0px;
|
||||
border-color: #00FF00;
|
||||
font-family: monospace;
|
||||
display: block;
|
||||
margin: 30px auto;
|
||||
}
|
||||
|
||||
button:hover{
|
||||
color: white;
|
||||
background-color: black;
|
||||
}
|
||||
|
||||
#title{
|
||||
text-align: center;
|
||||
}
|
||||
|
||||
.green{
|
||||
color: #00FF00;
|
||||
}
|
||||
|
||||
.error{
|
||||
background-color: red;
|
||||
color: white;
|
||||
}
|
||||
|
||||
.win{
|
||||
background-color: white;
|
||||
color: #00FF00;
|
||||
}
|
||||
|
||||
.win :hover{
|
||||
background-color: white;
|
||||
color: #00FF00;
|
||||
}
|
||||
|
||||
.score-wrapper{
|
||||
padding: 5px;
|
||||
}
|
||||
|
||||
.score-wrapper h3{
|
||||
margin: 0px;
|
||||
}
|
||||
|
||||
.score-wrapper .left{
|
||||
float: left;
|
||||
width: 50%;
|
||||
margin: 0px;
|
||||
}
|
||||
|
||||
.score-wrapper .right{
|
||||
float: right;
|
||||
width: 50%;
|
||||
margin: 0px;
|
||||
}
|
||||
|
||||
.response-wrapper{
|
||||
padding-bottom: 8px;
|
||||
}
|
||||
|
||||
hr{
|
||||
border-color: #00ff00;
|
||||
margin: 6px 0px;
|
||||
}
|
||||
|
||||
table{
|
||||
width: 900px;
|
||||
font-size: 14px;
|
||||
}
|
||||
|
||||
th{
|
||||
text-align: left;
|
||||
padding: 0px 4px;
|
||||
}
|
||||
|
||||
td{
|
||||
padding: 0px 4px;
|
||||
overflow: hidden;
|
||||
}
|
||||
|
||||
.column-titles{
|
||||
margin-bottom: 2px;
|
||||
}
|
||||
|
||||
#play-wrapper{
|
||||
padding:0px 2px;
|
||||
margin: 0px;
|
||||
}
|
||||
|
||||
.column{
|
||||
padding: 0px 1px;
|
||||
overflow: hidden;
|
||||
margin: 0px;
|
||||
}
|
||||
|
||||
|
||||
|
||||
.address-choice{
|
||||
margin: 0px;
|
||||
padding: 0px;
|
||||
}
|
||||
|
||||
.address-choice span{
|
||||
overflow: hidden;
|
||||
display: inline-block;
|
||||
}
|
||||
|
||||
.entry:hover{
|
||||
color: black;
|
||||
background-color: #00ff00;
|
||||
cursor: pointer;
|
||||
}
|
||||
|
||||
.lockoutMark{
|
||||
display: inline;
|
||||
}
|
||||
.screen,button{border-width:1px;border-color:#0F0;font-family:monospace;margin:30px auto}.screen,button:hover{color:#fff;background-color:#000}.column,.screen,td{overflow:hidden}.hidden{display:none}.screen{width:900px;min-height:800px;border-style:solid;border-radius:26px}#messege{height:560px;text-transform:uppercase;font-size:16px}button{padding:10px 25px;color:#000;background-color:#0F0;border-style:none none solid;border-radius:0;display:block}#title{text-align:center}.green{color:#0F0}.error{background-color:red;color:#fff}.win,.win :hover{background-color:#fff;color:#0F0}.score-wrapper{padding:5px}.score-wrapper h3{margin:0}.score-wrapper .left{float:left;width:50%;margin:0}.score-wrapper .right{float:right;width:50%;margin:0}.response-wrapper{padding-bottom:8px}td,th{padding:0 4px}hr{border-color:#0f0;margin:6px 0}table{width:900px;font-size:14px}th{text-align:left}.column-titles{margin-bottom:2px}#play-wrapper{padding:0 2px;margin:0}.column{padding:0 1px;margin:0}.address-choice{margin:0;padding:0}.address-choice span{overflow:hidden;display:inline-block}.entry:hover{color:#000;background-color:#0f0;cursor:pointer}.lockoutMark{display:inline}
|
||||
Loading…
x
Reference in New Issue
Block a user