当前位置:网站首页>Stegano in the world of attack and defense
Stegano in the world of attack and defense
2022-07-01 16:32:00 【Golden silk】
It's a pdf file
Open it first

A bunch of English letters, nothing , Tip no flag 了
Then use notepad++ Look at the file

Ctrl+F Quick search flag
Found something , The coding tail in the back has = Number , The approximate rate is base64
Copy the past and decode

emmm, Good guy, this is not flag
Find out if there is anything special

Only to find the difference here , Think about it PDF Steganography , Transparent words ....
Open the file with a browser , See if there is any copy empty
Sure enough , In the first line, there is something fishy

Copy down , Paste into an empty file

emmmm, Let's copy the full text directly
Sure enough, I found something different in the second line
Only AB Code for , Think of the previous discovery tips AB .-
It should be Morse code , hold A Switch to . , hold B Switch to -
Decoding will OK 了
On the text editor , Delete except AB All codes outside , Then use the built-in replacement function , Replace all symbols


Copy to the website for decoding

obtain
CONGRATULATIONS,FLAG:1NV151BL3M3554G3
Change the format to submit OK 了
边栏推荐
猜你喜欢

Nuxt. JS data prefetching

Learn selenium to simulate mouse operation, and you can be lazy a little bit

What is the digital transformation of manufacturing industry

Embedded development: five revision control best practices

Do280 management application deployment - pod scheduling control

How does win11 set user permissions? Win11 method of setting user permissions

接口测试框架中的鉴权处理

Guide for high-end programmers to fish at work

Talking from mlperf: how to lead the next wave of AI accelerator

数据库系统原理与应用教程(004)—— MySQL 安装与配置:重置 MySQL 登录密码(windows 环境)
随机推荐
Preliminary study on golang crawler framework
Red team Chapter 10: ColdFusion the difficult process of deserializing WAF to exp to get the target
idea启动Command line is too long问题处理
Go 语言错误处理为什么更推荐使用 pkg/errors 三方库?
数据库系统原理与应用教程(005)—— yum 离线安装 MySQL5.7(Linux 环境)
制造业数字化转型究竟是什么
Guide for high-end programmers to fish at work
Zabbix2.2 monitoring system and application log monitoring alarm
Five years after graduation, I became a test development engineer with an annual salary of 30w+
VMware 虛擬機啟動時出現故障:VMware Workstation 與 Hyper-v 不兼容...
红队第8篇:盲猜包体对上传漏洞的艰难利用过程
【Hot100】17. 电话号码的字母组合
Embedded development: five revision control best practices
【Hot100】19. Delete the penultimate node of the linked list
Learn selenium to simulate mouse operation, and you can be lazy a little bit
全面看待企业数字化转型的价值
Zabbix2.2监控之系统及应用日志监控报警
picgo快捷键 绝了这人和我的想法 一模一样
FPN网络详解
DO280管理应用部署--pod调度控制