当前位置:网站首页>Stegano in the world of attack and defense
Stegano in the world of attack and defense
2022-07-01 16:32:00 【Golden silk】
It's a pdf file
Open it first
A bunch of English letters, nothing , Tip no flag 了
Then use notepad++ Look at the file
Ctrl+F Quick search flag
Found something , The coding tail in the back has = Number , The approximate rate is base64
Copy the past and decode
emmm, Good guy, this is not flag
Find out if there is anything special
Only to find the difference here , Think about it PDF Steganography , Transparent words ....
Open the file with a browser , See if there is any copy empty
Sure enough , In the first line, there is something fishy
Copy down , Paste into an empty file
emmmm, Let's copy the full text directly
Sure enough, I found something different in the second line
Only AB Code for , Think of the previous discovery tips AB .-
It should be Morse code , hold A Switch to . , hold B Switch to -
Decoding will OK 了
On the text editor , Delete except AB All codes outside , Then use the built-in replacement function , Replace all symbols
Copy to the website for decoding
obtain
CONGRATULATIONS,FLAG:1NV151BL3M3554G3
Change the format to submit OK 了
边栏推荐
- Go 语言错误处理为什么更推荐使用 pkg/errors 三方库?
- 为国产数据库添砖加瓦,StoneDB 一体化实时 HTAP 数据库正式开源!
- The sharp drop in electricity consumption in Guangdong shows that the substitution of high-tech industries for high-energy consumption industries has achieved preliminary results
- [SQL statement] Why do you select two Shanghai and query different counts here? I want it to become a Shanghai, and count only displays a sum
- Zabbix2.2监控之系统及应用日志监控报警
- Analysis of PostgreSQL storage structure
- 【Hot100】19. Delete the penultimate node of the linked list
- Go 语言怎么优化重复的 if err != nil 样板代码?
- 高端程序员上班摸鱼指南
- Vscode find and replace the data of all files in a folder
猜你喜欢
How long will it take to achieve digital immortality? Metacosmic holographic human avatar 8i
There is a difference between u-standard contract and currency standard contract. Will u-standard contract explode
普通二本,去过阿里外包,到现在年薪40W+的高级测试工程师,我的两年转行心酸经历...
How to adjust the size of computer photos to what you want
【Hot100】17. Letter combination of telephone number
毕业季 | 华为专家亲授面试秘诀:如何拿到大厂高薪offer?
Learn selenium to simulate mouse operation, and you can be lazy a little bit
SQLServer查询: a.id与b.id相同时,a.id对应的a.p在b.id对应的b.p里找不到的话,就显示出这个a.id和a.p
使用腾讯云搭建图床服务
程序员职业生涯真的很短吗?
随机推荐
C#/VB. Net merge PDF document
实现数字永生还有多久?元宇宙全息真人分身#8i
Telecommuting experience? Let's introduce ourselves ~ | community essay solicitation
Zabbix2.2 monitoring system and application log monitoring alarm
The sharp drop in electricity consumption in Guangdong shows that the substitution of high-tech industries for high-energy consumption industries has achieved preliminary results
How to use phpipam to manage IP addresses and subnets
IM即时通讯开发万人群聊消息投递方案
[daily news]what happened to the corresponding author of latex
P2592 [ZJOI2008]生日聚会(dp)
laravel的模型删除后动作
EndeavourOS移动硬盘安装
The supply of chips has turned to excess, and the daily output of Chinese chips has increased to 1billion, which will make it more difficult for foreign chips
[nodemon] app crashed - waiting for file changes before starting... resolvent
Comment win11 définit - il les permissions de l'utilisateur? Win11 comment définir les permissions de l'utilisateur
红队第10篇:coldfusion反序列化过waf改exp拿靶标的艰难过程
There will be a gap bug when the search box and button are zoomed
如何使用phpIPAM来管理IP地址和子网
FPN network details
The picgo shortcut is amazing. This person thinks exactly the same as me
IM即时通讯开发实现心跳保活遇到的问题