原题
工具
stegsolve1.3。
解题思路
kali里使用binwalk试一试能不能拆分文件,结果不能。
下面用stegsolve查看是否隐写。调整通道发现二维码。
扫描出来一长串字符:
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
放入winhex内后查看文件头,是pyc文件。pyc文件是python的二进制文件。
保存为pyc文件,不过pyc是二进制文件,需要反编译我们才能看懂,pyc反编译网站
其实这里已经看到flag了,不过还是下载下来运行。不过他这是python2的代码,python3运行需要小小地修改:
def flag():
str = [
102,
108,
97,
103,
123,
51,
56,
97,
53,
55,
48,
51,
50,
48,
56,
53,
52,
52,
49,
101,
55,
125]
flag = ''
for i in str:
flag += chr(i)
print(flag)
flag()