当前位置:网站首页>Stegano in the world of attack and defense
Stegano in the world of attack and defense
2022-07-01 16:32:00 【Golden silk】
It's a pdf file
Open it first

A bunch of English letters, nothing , Tip no flag 了
Then use notepad++ Look at the file

Ctrl+F Quick search flag
Found something , The coding tail in the back has = Number , The approximate rate is base64
Copy the past and decode

emmm, Good guy, this is not flag
Find out if there is anything special

Only to find the difference here , Think about it PDF Steganography , Transparent words ....
Open the file with a browser , See if there is any copy empty
Sure enough , In the first line, there is something fishy

Copy down , Paste into an empty file

emmmm, Let's copy the full text directly
Sure enough, I found something different in the second line
Only AB Code for , Think of the previous discovery tips AB .-
It should be Morse code , hold A Switch to . , hold B Switch to -
Decoding will OK 了
On the text editor , Delete except AB All codes outside , Then use the built-in replacement function , Replace all symbols


Copy to the website for decoding

obtain
CONGRATULATIONS,FLAG:1NV151BL3M3554G3
Change the format to submit OK 了
边栏推荐
- 【Hot100】20. 有效的括号
- VMware 虚拟机启动时出现故障:VMware Workstation 与 Hyper-v 不兼容...
- Embedded development: five revision control best practices
- 【Hot100】19. Delete the penultimate node of the linked list
- Origin2018 installation and use (sorting)
- 2023 spring recruitment Internship - personal interview process and face-to-face experience sharing
- 近半年内连获5家“巨头”投资,这家智能驾驶“黑马”受资本追捧
- Which MySQL functions are currently supported by tablestore in table storage?
- Analysis of PostgreSQL storage structure
- Go language source level debugger delve
猜你喜欢

【观察】数字化时代的咨询往何处走?软通咨询的思与行

Analysis of PostgreSQL storage structure

Défaillance lors du démarrage de la machine virtuelle VMware: le poste de travail VMware n'est pas compatible avec hyper - V...

独家消息:阿里云悄然推出RPA云电脑,已与多家RPA厂商开放合作

Do280 management application deployment - pod scheduling control

Nuxt. JS data prefetching

In the past six months, it has been invested by five "giants", and this intelligent driving "dark horse" is sought after by capital

SQLServer查询: a.id与b.id相同时,a.id对应的a.p在b.id对应的b.p里找不到的话,就显示出这个a.id和a.p

广东用电量大跌,说明高新技术产业替代高能耗产业已取得初步成果

Zhou Shaojian, rare
随机推荐
Does 1.5.1 in Seata support mysql8?
UML旅游管理系统「建议收藏」
Im instant messaging develops a message delivery scheme for 10000 people
How to adjust the color of the computer screen and how to change the color of the computer screen
Is it reliable to open an account on flush with mobile phones? Is there any potential safety hazard
Zabbix2.2 monitoring system and application log monitoring alarm
ADS算力芯片的多模型架构研究
The supply of chips has turned to excess, and the daily output of Chinese chips has increased to 1billion, which will make it more difficult for foreign chips
idea启动Command line is too long问题处理
[daily news]what happened to the corresponding author of latex
复杂度相关OJ题(LeetCode、C语言、复杂度、消失的数字、旋转数组)
Solution to the problem that the keypad light does not light up when starting up
PostgreSQL 存储结构浅析
数据库系统原理与应用教程(006)—— 编译安装 MySQL5.7(Linux 环境)
How does win11 set user permissions? Win11 method of setting user permissions
Mlperf training v2.0 list released, with the same GPU configuration, the performance of Baidu PaddlePaddle ranks first in the world
Huawei issued hcsp-solution-5g security talent certification to help build 5g security talent ecosystem
How to write good code - Defensive Programming Guide
Idea start command line is too long problem handling
How long will it take to achieve digital immortality? Metacosmic holographic human avatar 8i