-->
当前位置:首页 > DayDayUp > 正文内容

一道简单的CTF题

Luz2年前 (2022-11-12)DayDayUp3350

好久没打CTF了,同学发了个题来玩玩

WP

压缩包打开是一个文本文件和一个flag.rar

image.png

文本就一句话,盲猜0宽度隐写,光标最前面按了好几次方向键才移到C后面,0宽度实锤


image.png

再次实锤

image.png

image.png

解密一下 https://330k.github.io/misc_tools/unicode_steganography.html

得到密码Cetacean

加压得到flag.exe

两种字符直接填充01后16位分割转当ascii用得到flag


image.png




image.png

flag{Cetac4an_C1pher_1s_a_g0od_eNc0de!!!!}

解密脚本

s="000000000110011000000000011011000000000001100001000000000110011100000000011110110000000001000011000000000110010100000000011101000000000001100001000000000110001100000000001101000000000001100001000000000110111000000000010111110000000001000011000000000011000100000000011100000000000001101000000000000110010100000000011100100000000001011111000000000011000100000000011100110000000001011111000000000110000100000000010111110000000001100111000000000011000000000000011011110000000001100100000000000101111100000000011001010000000001001110000000000110001100000000001100000000000001100100000000000110010100000000001000010000000000100001000000000010000100000000001000010000000001111101"
index=0
ss=''
result=''
for i in s:
    
    index=index+1
    if index%17==0:
        index=1
        print(ss)
        print(ss[8:])
        tar='0b'+ss[8:]
        result=result+chr(eval(tar)) 
        ss=i
        
    else:
        ss=ss+i

tar='0b'+ss[8:]
result=result+chr(eval(tar))
print(result)



发表评论

访客

◎欢迎参与讨论,请在这里发表您的看法和观点。