Difference between revisions of "Gameplay"

From Johnisdead Wiki
Jump to navigation Jump to search
Line 201: Line 201:
 
</ul>
 
</ul>
 
</div>
 
</div>
 
+
<br />
 
+
<h3>Ascii85 Ciphers</h3>
 
+
<div class="fadediv2"></div>
 
+
<p><b>Ascii85 ciphers</b> utilize the "base-85" system. As you might expect, this means that Ascii85 codes consist of 85 different characters. The characters used in Ascii85 ciphers are the Ascii characters 33 through 117. What this means exactly is that Ascii85 ciphers will contain every upper-case letter, every number, a plethora of punctuation marks and symbols such as "#" and "$", and the lower-case letters "a" through "u". Despite their intimidating appearance, Ascii85 ciphers can be solved the same as any other.</p>
 
 
 
 
 
 
<p><b>Octal ciphers</b> are groups of eight characters consisting of random numbers.</p>
 
  
 
<div class="textexampletitle">
 
<div class="textexampletitle">
<p style="padding-left: 1em; padding-bottom: 0.5em; color: yellow; margin-bottom: 0px;">Typical Binary Cipher</p>
+
<p style="padding-left: 1em; padding-bottom: 0.5em; color: yellow; margin-bottom: 0px;">Ascii85 Cipher Examples</p>
 
</div>
 
</div>
 
<div class="textexamplebox"><poem style="margin-top: 0px; padding-top: 10px;">
 
<div class="textexamplebox"><poem style="margin-top: 0px; padding-top: 10px;">
22267164 31271156 31272040 21062564 31261564 32273145 346
+
6=FqL@j"'Y@qfX:2#
  
<span class="solution">Internet Detectives</span>
+
<b style="margin-left:2em;">Answer:</b> <span class="solution">Basic Ascii85</span>
 +
<b style="margin-left:2em;">Solution:</b> Solve cipher through any basic Ascii85 translator.
 +
<br />
 +
9lG&`+@C'aE,95u@<?'k+@1'YBk]Oa
 +
 
 +
<b style="margin-left:2em;">Answer:</b> <span class="solution">More Complicated Ascii85</span>
 +
<b style="margin-left:2em;">Solution:</b> Solve cipher through any basic Ascii85 translator.
 +
<br />
 +
aO]kBY'1@+&fYcE_#tI;
 +
 
 +
<b style="margin-left:2em;">Answer:</b> <span class="solution">Reversed Ascii85 Code</span>
 +
<b style="margin-left:2em;">Solution:</b> Reverse the cipher and solve.
 
</poem></div>
 
</poem></div>
 
<div class="summary" style="background-color:black;">
 
<div class="summary" style="background-color:black;">
 
<ul style="margin-top: 0px;">
 
<ul style="margin-top: 0px;">
 
<li>
 
<li>
<b>Identify</b>: Groups of eight characters consisting of random numbers.
+
<b>Identify</b>: Long, chaotic strings of text consisting of any upper-case letter, any number, a myriad of symbols, and any lower-case letter from "a" through "u".
 +
</li>
 +
<li>
 +
<b>Tool</b>: Any basic Ascii85 translator - [https://paulschou.com/tools/xlate/ Link]
 
</li>
 
</li>
 
<li>
 
<li>
<b>Solve</b>: Basic octal translator - [https://paulschou.com/tools/xlate/ Link]
+
<b>Tip</b>: Ascii85 ciphers are incredibly chaotic, containing many different characters. This makes them easy to identify.
 
</li>
 
</li>
</ul>
 
</div>
 
 
<p><b>Hexidecimal ciphers</b> </p>
 
 
<div class="textexampletitle">
 
<p style="padding-left: 1em; padding-bottom: 0.5em; color: yellow; margin-bottom: 0px;">Typical Binary Cipher</p>
 
</div>
 
<div class="textexamplebox"><poem style="margin-top: 0px; padding-top: 10px;">
 
22267164 31271156 31272040 21062564 31261564 32273145 346
 
 
<span class="solution">Internet Detectives</span>
 
</poem></div>
 
<div class="summary" style="background-color:black;">
 
<ul style="margin-top: 0px;">
 
 
<li>
 
<li>
<b>Identify</b>: Groups of eight characters consisting of random numbers.
+
<b>Tip</b>: Ascii85 ciphers are often found split between multiple lines. If you encounter multiple lines of Ascii85 code that is translating incorrectly, you may need to place the separate codes on one single line.
 
</li>
 
</li>
 
<li>
 
<li>
<b>Solve</b>: Basic octal translator - [https://paulschou.com/tools/xlate/ Link]
+
<b>Tip</b>: There is no easily discernible way to tell if an Ascii85 cipher has been reversed or not. Unfortunately, a fair amount of experimentation may be required to solve some Ascii85 ciphers.  
 
</li>
 
</li>
 
</ul>
 
</ul>
 
</div>
 
</div>
 +
 +
 +
  
  

Revision as of 11:11, 3 June 2020

This page covers various methods used by the Players to participate in Johnisdead.

Exploring Websites

Most of the time playing Johnisdead is spent exploring Websites. Some websites such as Lunarchildren.com contain pages of text detailing in-game lore that must be parsed through. Other sites such as Johnisdead.com consist of cryptic images and sounds that contain hints that lead to hidden pages. These hidden pages often lead to even more secret pages that reveal details important to understanding the story of Johnisdead. These long sequences of hidden pages are often referred to as Holes.

When exploring websites, it's important to check the following:

Page Source

The source code of a page on Johnisdead.com referencing the page's title, image and audio files, and a hidden comment.

Most browsers have the option view the source of any web-page on the internet. This will reveal the page's HTML as loaded by your browser. Viewing a page's HTML will not only allow you to easily view secret links and filenames, but it will also reveal comments - text hidden within a page's source code. Viewing a page's source is also the easiest way to uncover the names and details of any scripts referenced on the page.

Page Title

The page title is the text that appears within your browser's tabs, favorites, and history. These titles often contain hints or ciphers that should be documented.

Files

Most pages will contain image and audio files. Accessing these files through the page source is beneficial not only for documentation purposes, but also because said files may not be fully implemented into a page. For example, a page may be scripted to only play the first five seconds of a ten second audio file. Accessing the page's files directly will reveal any hidden details. Analyzing files further will be covered in more detail further down.

Solving Ciphers

Nearly every aspect of Johnisdead's gameplay will at some point involve ciphers. Ciphers are coded messages that must be translated in a specific way to solve. There are a multitude of different ciphers, each requiring their own methods to solve:

Binary Ciphers

Binary ciphers are series of ones and zeros in groups of eight. Every letter, number, and punctuation mark has a specific binary code that it is represented by. For example, the capitalized letter "A" is referenced by the binary code "01000001". The number one is referenced by the binary code "00110001". Sometimes entire sentences are encoded in binary, resulting in long blocks of binary code.

Binary Cipher Examples

01000010 01100001 01110011 01101001 01100011 00100000 01000010 01101001 01101110 01100001 01110010 01111001

Answer: Basic Binary
Solution: Solve cipher through any basic binary translator.


10011110 01001110 10000110 01110110 10010110 01000010 00000100 00100110 10100110 11001110 01001110 10100110 01101110 10100110 01001010

Answer: Reversed Binary
Solution: Reverse the cipher and solve.


ABABAABA ABBAABAB ABBBAAAA ABBABBAA ABBAAAAB ABBAAABB ABBAABAB ABBAABAA AABAAAAA ABAAAABA ABBABAAB ABBABBBA ABBAAAAB ABBBAABA ABBBBAAB

Answer: Replaced Binary
Solution: Replace the letters "A" and "B" with zeroes and ones respectively and solve.

  • Identify: Groups of eight characters consisting of either ones or zeroes.
  • Tool: Any basic binary translator - Link
  • Tip: Binary representing common characters begin with the number zero. If you encounter binary that begins with the number one, it's likely that the entire cipher has been reversed. In this case, one must correct the cipher by reversing it themselves for it to be solved.
  • Tip: As its name implies, binary's most defining trait is its use of only two characters. This makes it easily identifiable. You may encounter some binary ciphers where the ones and zeroes have been replaced with letters or even entire words. If you encounter a strange looking cipher consisting of patters such as "ABAAAAAB", its likely an obscured binary cipher.


Octal Ciphers

Octal ciphers are fairly similar to binary ciphers. Both ciphers consist of numbers and often appear in groups of eight. However, octal is a bit more complicated than binary. Octal is the "base-8" number system, meaning it uses combinations of the numbers zero through seven to represent characters.

Octal Cipher Examples

20460563 32261440 23661564 302660

Answer: Basic Octal
Solution: Solve cipher through any basic octal translator.


066203 46516632 04026213 36117213 66526442

Answer: Reversed Octal
Solution: Reverse the cipher and solve.

  • Identify: Groups of numbers ranging from zero to seven. These groups never exceed eight characters. Unlike binary, these groups may contain less than eight characters.
  • Tool: Any basic octal translator - Link
  • Tip: The maximum amount of numbers that may appear in an octal cipher before a space appears is eight. This makes octal ciphers fairly easy to identify. If you encounter a cipher consisting of eight numbers followed by a smaller group of numbers, then it is likely an octal cipher. Example: "23240524 250".
  • Tip: The numbers within an octal cipher never exceed seven. If you see numbers higher than seven in a cipher, then it is not an octal code.


Hexadecimal Ciphers

Hexadecimal ciphers are fairly easy to identify. Whereas binary and octal ciphers were both made up of groups of eight characters, hexadecimal ciphers are made up of groups of two characters. These two characters will either be two numbers, or a number followed by a letter. While octal uses a "base-8" system, hexadecimal uses a "base-16" system. This means that hexadecimal uses 16 characters - the numbers zero through nine and the letters "A" through "F".

Hexadecimal Cipher Examples

42 61 73 69 63 20 48 65 78 61 64 65 63 69 6d 61 6c

Answer: Basic Hexadecimal
Solution: Solve cipher through any basic hexadecimal translator.


c6 16 d6 96 36 56 46 16 87 56 84 02 46 56 37 27 56 67 56 25

Answer: Reversed Hexadecimal
Solution: Reverse the cipher and solve.

  • Identify: Groups of two characters consisting of either two numbers or a number followed by a letter. Only the numbers zero through nine and the letters "A" through "F" are used.
  • Tool: Any basic hexadecimal translator - Link
  • Tip: Hexadecimal is a very distinct code. If you encounter any oddities such as groups of three characters or numbers and letters outside of the hexadecimal range, then the code has either been tampered or is a completely different cipher completely.


Base32 Ciphers

As the name implies, Base32 ciphers utilize the "base-32" system. This means that Base32 ciphers will only ever contain the following 32 characters - the capitalized letters "A" through "Z" and the numbers two through seven. Base32 ciphers contain no spaces. This makes them fairly easy to identify, as they often appear as long, uninterrupted blocks of text consisting of numbers and capitalized letters.

Base32 Cipher Examples

IJQXG2LDEBBGC43FGMZA

Answer: Basic Base32
Solution: Solve cipher through any basic Base32 translator.


SZMKWZFMCCIIWSNOSLZMXSJK

Answer: Reversed Base32
Solution: Reverse the cipher and solve.

  • Identify: Long strings of text consisting of capitalized letters and the numbers two through seven. Contains no spaces.
  • Tool: Any basic base32 translator - Link
  • Tip: Base32 follows a strict character set. If you are having trouble solving a base32 cipher, make sure that there are no lower-case letters, spaces, or instances of the numbers zero, one, eight, or nine. Also ensure that your entire code is on a single line, as your base32 translator may be interpreting the line break as a character within the code.


Base64 Ciphers

Base64 ciphers utilize the "base-64" system, meaning they may consist of any letter, upper and lower-case, and any number. Base64 ciphers may also include the characters "/" and "+". Base64 ciphers sometimes end with one or two equal signs. There are also no spaces in Base64 ciphers, making them distinct blocks of what initially appears to be garbled letters and numbers.

Base64 Cipher Examples

QmFzaWMgQmFzZTY0

Answer: Basic Base64
Solution: Solve cipher through any basic Base64 translator.


TW9yZSBCYXNlNjQgQ29kZQ==

Answer: More Base64 Code
Solution: Solve cipher through any basic Base64 translator.


=UGZvNEI0YTZzFmQgQWZzJXZ2VmU

Answer: Reversed Base64 Code
Solution: Reverse the cipher and solve.

  • Identify: Long strings of text consisting of upper and lower-case letters, numbers, and the characters "/" and "+". Often ends with one or two equal signs.
  • Tool: Any basic base64 translator - Link
  • Tip: Unlike previous ciphers, base64 contains all letters and numbers. This in and of itself makes it fairly easy to identify.
  • Tip: The equal signs that sometimes appear within base64 ciphers always appear at the end of the code. If you encounter a cipher with one or two equal signs at the beginning of the text, it's likely this is a base64 cipher that has been reversed.


Ascii85 Ciphers

Ascii85 ciphers utilize the "base-85" system. As you might expect, this means that Ascii85 codes consist of 85 different characters. The characters used in Ascii85 ciphers are the Ascii characters 33 through 117. What this means exactly is that Ascii85 ciphers will contain every upper-case letter, every number, a plethora of punctuation marks and symbols such as "#" and "$", and the lower-case letters "a" through "u". Despite their intimidating appearance, Ascii85 ciphers can be solved the same as any other.

Ascii85 Cipher Examples

6=FqL@j"'Y@qfX:2#

Answer: Basic Ascii85
Solution: Solve cipher through any basic Ascii85 translator.


9lG&`+@C'aE,95u@<?'k+@1'YBk]Oa

Answer: More Complicated Ascii85
Solution: Solve cipher through any basic Ascii85 translator.


aO]kBY'1@+&fYcE_#tI;

Answer: Reversed Ascii85 Code
Solution: Reverse the cipher and solve.

  • Identify: Long, chaotic strings of text consisting of any upper-case letter, any number, a myriad of symbols, and any lower-case letter from "a" through "u".
  • Tool: Any basic Ascii85 translator - Link
  • Tip: Ascii85 ciphers are incredibly chaotic, containing many different characters. This makes them easy to identify.
  • Tip: Ascii85 ciphers are often found split between multiple lines. If you encounter multiple lines of Ascii85 code that is translating incorrectly, you may need to place the separate codes on one single line.
  • Tip: There is no easily discernible way to tell if an Ascii85 cipher has been reversed or not. Unfortunately, a fair amount of experimentation may be required to solve some Ascii85 ciphers.



Character Interaction

Analyzing Files