当前位置:网站首页>Misc (eternal night), the preliminary competition of the innovation practice competition of the National College Students' information security competition
Misc (eternal night), the preliminary competition of the innovation practice competition of the National College Students' information security competition
2022-07-06 02:41:00 【Like to drink Wangzai's Wangwang】
The tense final is finally over , I just have time to sum up one of the competitions some time ago misc subject , Layers of dolls are very interesting .
Title Attachment :
link :https://pan.baidu.com/s/1lZ6YCyyY3hdMx2_ymLlsyA
Extraction code :viy2
-- From Baidu network disk super member V1 The share of
Get the picture , The old rules use 010 Open file :

A string of abnormal data is found at the end of the file
Question prompt this question is lsb Steganography
Use the tool to analyze the color trace of the picture

In this color channel, I found a string of things similar to moss code
Analyze the file corresponding to the color track and find this string of ciphertext
The title also suggests a little use password Of lsb Steganography , Associated with the github Last project cloacked-pixel
Project address :GitHub - livz/cloacked-pixel: LSB steganography and detection

utilize a2 The information in the channel is read out, and the hidden information is output as a txt file
open txt file

pk The file header Obviously compressed package Change the suffix of the file to zip Prompt for password
At this time, we think of the last string of data in the picture at the beginning Try various decryption methods Last use md5 figure out

Get the final decompression password
decompression Get a picture


Unable to open The prompt file is corrupt
The conventional thinking here is based on crc Explode the correct width and height of the picture , Let the picture parse normally . Here is a more ingenious way
Change the picture name to flag.data Reuse gimp Open the picture Adjust the width to get the final flag

边栏推荐
- Atcoder beginer contest 233 (a~d) solution
- PMP practice once a day | don't get lost in the exam -7.5
- inherited constructors
- How does yyds dry inventory deal with repeated messages in the consumption process?
- Redis cluster deployment based on redis5
- Number conclusion LC skimming review - 1
- Microsoft speech synthesis assistant v1.3 text to speech tool, real speech AI generator
- 有没有sqlcdc监控多张表 再关联后 sink到另外一张表的案例啊?全部在 mysql中操作
- DDoS "fire drill" service urges companies to be prepared
- 550 permission denied occurs when FTP uploads files, which is not a user permission problem
猜你喜欢

Gifcam v7.0 minimalist GIF animation recording tool Chinese single file version

主数据管理理论与实践

"Hands on learning in depth" Chapter 2 - preparatory knowledge_ 2.5 automatic differentiation_ Learning thinking and exercise answers
![[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 22](/img/e0/21367eeaeca10c0a2f2aab3a4fa1fb.jpg)
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 22

C language - Blue Bridge Cup - promised score
![[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 15](/img/72/0fe9cb032339d5f1ccf6f6c24edc57.jpg)
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 15

PMP practice once a day | don't get lost in the exam -7.5

如何精准识别主数据?

零基础自学STM32-野火——GPIO复习篇——使用绝对地址操作GPIO
![[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 17](/img/85/2635afeb2edeb0f308045edd1f3431.jpg)
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 17
随机推荐
Crawler (9) - scrape framework (1) | scrape asynchronous web crawler framework
DDoS "fire drill" service urges companies to be prepared
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 14
Elimination games
Shell script updates stored procedure to database
2.12 simulation
RobotFramework入门(一)简要介绍及使用
I changed the driver to 5.1.35, but it is still the same error. I can succeed even now, but I will report this every time I do an SQL operation
2345 file shredding, powerful file deletion tool, unbound pure extract version
构建库函数的雏形——参照野火的手册
What should we pay attention to when using the built-in tool to check the health status in gbase 8C database?
Briefly describe the implementation principle of redis cluster
事故指标统计
QT release exe software and modify exe application icon
故障分析 | MySQL 耗尽主机内存一例分析
DDoS attacks - are we really at war?
Pat 1046 shortest distance (20 points) simulation
A doctor's 22 years in Huawei
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 22
MySQL winter vacation self-study 2022 11 (5)