如题
下载压缩包并解压,发现一张图片和一个加密的压缩包
用StegSolve打开 try to restore it.png,发现在Red通道有一张图片
保存后打开可以得到一个zip-passwd!@#$%67*()-+
,但是flag.rar并不是zip压缩包,所以这个密码解压的压缩包另有一个
用foremost分离try to restore it.png可以分离出一个zip压缩包,解压后可以得到out.txt
将这些书转换为二进制发现只有前两位不同,为TTL隐写,编写脚本解码得到rar解压密码0ac1fe6b77be5dbe
count = 0
str=""
with open('out.txt', 'r') as f:
for line in f:
num = int(line)
ss = bin(num)
while len(ss) < 10:
ss = ss[:2] + '0' + ss[2:]
#print(ss)
str=str+ss[2:4]
count += 1
if count == 4:
count = 0
sum=0
#print(str)
for i in range(len(str)):
if str[i]=='1':
sum=sum*2+1
else:
sum=sum*2
# print(sum)
print(chr(sum),end="")
str=""
解压flag.rar,发现里面的zip压缩包很明显是word文档,更改后缀为.docx
更改文字颜色为红色,在下方可以发现一些base64编码,编写脚本一行一行解码
import base64
with open('data.txt','r') as file:
for i in file.readlines():
line = str(base64.b64decode(i))
print(line)
#print(line.replace('1',' '))
将字符‘1’替换为空格,得到flag{He1Lo_mi5c~}
import base64
with open('data.txt','r') as file:
for i in file.readlines():
line = str(base64.b64decode(i))
print(line.replace('1',' '))