The CPP website is using a thirdparty hosted CMS (hosting thousands of unrelated companies). The login form is just a way to log into the backend of the CMS. The file list was created by someone on 4chan by modifying the login form using inspector. The file list where all the files are gone (like they were suddenly deleted) was created by someone from the PG Discord (someone thinking to be some 1337 hacker=cracker, but actually just a scriptkiddie). The file is just a PDF containing the menu that can be downloaded from the frontend. This was already researched about 2 months ago. This research is really lacking organization.
Sorry guys, this is a total dead end. The number 4741080860 is the ID of the Menu stored in the database. So it's the same file being downloaded no whatever what file you put in the URL.
The files originally viewable in the protected part of the site were massive but heavily encrypted. The size made it very likely to be videos. My theory all along was that CPP was a transactional centerpoint/hub, with potentially most of the misdeeds off premise, possibly at Buck"s as one example.
The biggest zip file that was listed on their site appears to be around 25 Mb if the original file size is given in bytes (seen from the Youtube video)
I highly doubt they'd still have their files on their servers. If anything, it'd be a fake and I don't suggest pushing this. OP registered 39 minutes ago.
EDIT: Sorry for being skeptical, I'll at least give you props for proving that the screenshot of encrypted files is real.
Haha, I successfully unzipped them. Someone has just replaced them all with a folder containing random website images from their site. The file size 7.5mb is nowhere near the "original" zip file sizes. They have replaced the real files with fakes.
Here is the entire contents of the zip folder, and I tried 2 of them, same attachments in both:
http://sli.mg/R6rQsS
From what I read, was, when cometpingpong.com/protected didn't need a password to see the list of downloads (now you need a password just to access the list, then another password to download files) and you tried to download any file with a random key, it would obviously recognise that the download key is incorrect and download the default file, which seems to be this ~7.5mb menu file.
You need the correct download key otherwise you'll not get the
actual
file.
EDIT: HMM. The menu when you download from the official link from their menu page is only 200KB. The zip file that shares the same file ID # 4750801860 opens as a PDF when renamed - yet it's an 8 MB pdf.
This could be evidence that blows this thing wide open if one could only decrypt the files. Please share!
Edit: Like rutkdn mentioned, that zip file appears to be just a pdf file and opens when the file extension is renamed. Does anyone have any of the files that appeared on the website?
▼ DiggingforTruth
Wow. Serious sleuthing!! Way to go!
▼ KiRa2115
They turned it into a honey pot the 2nd day of pizzagate.
▼ deorder
The CPP website is using a thirdparty hosted CMS (hosting thousands of unrelated companies). The login form is just a way to log into the backend of the CMS. The file list was created by someone on 4chan by modifying the login form using inspector. The file list where all the files are gone (like they were suddenly deleted) was created by someone from the PG Discord (someone thinking to be some 1337 hacker=cracker, but actually just a scriptkiddie). The file is just a PDF containing the menu that can be downloaded from the frontend. This was already researched about 2 months ago. This research is really lacking organization.
▼ fartyshorts
Why so many versions of the same file?
▼ deorder
They were all the same, not different versions. All the same PDF. Could not find anything inside. You may check it out for yourself.
▼ dannonyme
No, calling a pedophile "Mr" doesn't give you away at all! LOL
▼ RecycledUser
This isn't directed at OP, but just a reminder to any newbies, to be cautious of honeypots, and possible setups to get someone to download CP.
▼ RecycledUser
Sure thing, shill.
▼ ShabbaStoney
Sorry guys, this is a total dead end. The number 4741080860 is the ID of the Menu stored in the database. So it's the same file being downloaded no whatever what file you put in the URL.
▼ reasonedandinformed
The files originally viewable in the protected part of the site were massive but heavily encrypted. The size made it very likely to be videos. My theory all along was that CPP was a transactional centerpoint/hub, with potentially most of the misdeeds off premise, possibly at Buck"s as one example.
▼ followthemoney
https://youtu.be/QCdprP2IyV8
▼ ShabbaStoney
Well it seems a dead end, was worth a try.
▼ delivery1
The biggest zip file that was listed on their site appears to be around 25 Mb if the original file size is given in bytes (seen from the Youtube video)
▼ redberries
I highly doubt they'd still have their files on their servers. If anything, it'd be a fake and I don't suggest pushing this. OP registered 39 minutes ago.
EDIT: Sorry for being skeptical, I'll at least give you props for proving that the screenshot of encrypted files is real.
▼ Fateswebb
I thought we were invite only right now...
▼ RecycledUser
That would be nice.
▼ 28leinad82
they are fake files, they have replaced all real files with a standard 7.4mb zip containing boring website images.
▼ fartyshorts
Yeah, I can confirm this. They have all been replaced by the same file.
▼ B3nder
wasn't their computer/server "shot" by the false flag guy ?
▼ ShabbaStoney
Yes because I needed to be registered to submit a thread.
EDIT: No worries, I would have probably been the same. I'm new to this voat thing :)
▼ DarkMath
You need to archive this somehow in case they delete that file.
▼ Thakiddds
Upvoat
▼ ShabbaStoney
Seems very strange for a PDF to be stored as a zip
▼ 28leinad82
Haha, I successfully unzipped them. Someone has just replaced them all with a folder containing random website images from their site. The file size 7.5mb is nowhere near the "original" zip file sizes. They have replaced the real files with fakes.
Here is the entire contents of the zip folder, and I tried 2 of them, same attachments in both: http://sli.mg/R6rQsS
▼ n0mar
From what I read, was, when cometpingpong.com/protected didn't need a password to see the list of downloads (now you need a password just to access the list, then another password to download files) and you tried to download any file with a random key, it would obviously recognise that the download key is incorrect and download the default file, which seems to be this ~7.5mb menu file.
You need the correct download key otherwise you'll not get the actual file.
▼ ShabbaStoney
Just curious, how did you manage to unzip them?
▼ 28leinad82
i just used a mac app called "unarchiver". it unzipped them straight away. none of my other zip apps worked.
▼ ShabbaStoney
Interesting, I wonder if any of the PDF files in the podesta emails can be changed to ZIP's and unarchived.
▼ 28leinad82
which PDFs were "Archived" or encrypted in his emails?
▼ rutkdn
This particular file is a PDF. Rename .zip to .pdf and it's their menu. I'm not saying there isn't anything else hiding in this 7 meg file though.
Also available from this URL: https://www.cometpingpong.com/app/download/4750801860/Comet+Ping+Pong+menu.pdf?t=1437072342
EDIT: HMM. The menu when you download from the official link from their menu page is only 200KB. The zip file that shares the same file ID # 4750801860 opens as a PDF when renamed - yet it's an 8 MB pdf.
▼ golly
Interesting! Did you do a diff/strings? You might be able to spot more than one header/footer in there.
▼ 28leinad82
I'll have a go... do you have a list of all the URLs?
▼ zoltan907
https://sli.mg/a5Fcpn
▼ delivery1
This could be evidence that blows this thing wide open if one could only decrypt the files. Please share!
Edit: Like rutkdn mentioned, that zip file appears to be just a pdf file and opens when the file extension is renamed. Does anyone have any of the files that appeared on the website?