21 reverseMe
复制图片,在线ocr识别,https://ocr.wdku.net/,都不费眼睛。
22 misc_pic_again
┌──(holyeyes㉿kali2023)-[~/Misc/tool-misc/zsteg]
└─$ zsteg misc_pic_again.png
imagedata … text: “$$KaTeX parse error: Undefined control sequence: \0 at position 60: …t metric data (\̲0̲34,\225\370lC\2…\314\004_4\321\345G\231Dn\005\230\230\335\331\305_\317\217\262)\311\311\265\360\262-\336X\204\300\251\2612\023<\247m7\313\237\213\253\336\357\305S\277;\2356\014<\362\244\312\266\227\016\264\304\0200\235\200Y\316\357r;\321)
b1,rgb,lsb,xy … file: Zip archive data, at least v2.0 to extract, compression method=deflate
b2,g,lsb,xy … text: “A@qs{cZ;”
b2,rgb,msb,xy … file: OpenPGP Public Key
b3,r,lsb,xy … file: gfxboot compiled html help file
b3,rgb,lsb,xy … text: “Kd"Yl*\6”
b4,r,lsb,xy … file: Targa image data (0) 256 x 1 x 16 - 1-bit alpha “\021\020\020\021\001\020”
b4,g,lsb,xy … text: “DDTDDD”“DE"0ED"3vgtEgfffDC2 "
b4,g,msb,xy … text: “””*”"“DD”"
b4,b,lsb,xy … text: “vUDDD”# "
b4,bgr,msb,xy … file: OpenPGP Secret Key
┌──(holyeyes㉿kali2023)-[~/Misc/tool-misc/zsteg]
└─$ zsteg -e b1,rgb,lsb,xy misc_pic_again.png > misc_pic_again.zip
┌──(holyeyes㉿kali2023)-[~/Misc/tool-misc/zsteg]
└─$
hctf{scxdc3tok3yb0ard4g41n~~~}
23 hong
┌──(holyeyes㉿kali2023)-[~/Misc/timu/zulu]
└─$ foremost hong.mp3
Processing: hong.mp3
|*|
output目录下打开相关文件
BCTF{cute&fat_cats_does_not_like_drinking}
Test-flag-please-ignore
flag{hello_world}
25 János-the-Ripper
flag{ev3n::y0u::bru7us?!}
26 Erik-Baleog-and-Olaf
经过对比,发现这个文件是一张PNG格式的图片,所以我们将他的后缀改为PNG即可
from PIL import Image
exp = Image.open("22kurzm.png") # 从010中最后一行网站下载的图片
cipher = Image.open("stego100.png") # 题目给的图片
new = Image.new("RGBA", size=exp.size)
for i in range(640):
for j in range(480):
y_p = exp.getpixel((i, j))
c_p = cipher.getpixel((i