Post
Topic
Board Off-topic
Re: BOUNTY: Crack this value, get bitcoin
by
Stoyvo
on 06/07/2016, 15:03:32 UTC
It's directly related to a MP3 id3v2.3 tag. There's an app called Serato that creates it's own data placed in a GEOB (General encapsulated object).

Let me explain:
Here's our string:
Quote
AQFDT0xPUgAAAAAEAJmZmUNVRQAAAAASAAAAAAAZAMwAAAAAU1RBUlQAQ1VFAAAAABMAAQAA
cbMAzIgAAABWT0NBTFMAQ1VFAAAAAA0AAgAAqoQAAADMAAAAQ1VFAAAAABMAAwABVPkAzMwA
AABEUk9QIDEAQ1VFAAAAAA0ABAABjcYAAMwAAAAAQ1VFAAAAABUABQAB/3MAzADMAABCdWls
ZHVwMgBDVUUAAAAADQAGAALp1AAAzMwAAABDVUUAAAAAEAAHAANbegCIAMwAAEVORABMT09Q
AAAAABUAAAADLGMAA0jL/////wAnquEAAABMT09QAAAAABUAAQAAABAAABx5/////wAnquEA
AQBCUE1MT0NLAAAAAAEAA

Decode the value to get the binary output. This tool proves useful: http://base64-encoding.online-domain-tools.com/

COLOR:
AQFDT0xPUgAAAAAEAJmZmU
First 8 chars are: ..COLOR. (Hex: 01 01 43 4f 4c 4f 52 00)
The next 8 chars are: ........ (Hex: 00 00 00 04 00 99 99 99)
The hex value "99 99 99" is the actual colour.

The next step is where I'm stuck and what the bounty is for. You can find the start of a CUE by finding the end of a colour value.
Hex: 43 55 45 (CUE). After this value, there should be values of Time, Colour, Text(START)

The difficulty is decoding the individual items (CUEs), not the object itself.