-->
当前位置:首页 > Eng > 正文内容

A simple CTF question

Luz1年前 (2022-11-18)Eng525

I haven't played CTF for a long time, and my classmates sent a question to try.

WP

The compressed package is opened as a text file and a flag.rar

image.png

The text is just a sentence, blind guess 0 width steganography, press the direction key several times at the front of the cursor before moving to the back of C, 0 width solid hammer

image.png

再次实锤

image.png

image.png

decode it in https://330k.github.io/misc_tools/unicode_steganography.html

got the password of the flag:Cetacean

unzip flag.rar and got flag.txt

there was 'E' and 'e' in the flag.txt,I to replace them with '0' and '1'

then split them with lenth of 16

image.png

image.png

find the flag after an ascii decode : flag{Cetac4an_C1pher_1s_a_g0od_eNc0de!!!!}

decode

Python
s="000000000110011000000000011011000000000001100001000000000110011100000000011110110000000001000011000000000110010100000000011101000000000001100001000000000110001100000000001101000000000001100001000000000110111000000000010111110000000001000011000000000011000100000000011100000000000001101000000000000110010100000000011100100000000001011111000000000011000100000000011100110000000001011111000000000110000100000000010111110000000001100111000000000011000000000000011011110000000001100100000000000101111100000000011001010000000001001110000000000110001100000000001100000000000001100100000000000110010100000000001000010000000000100001000000000010000100000000001000010000000001111101"index=0ss=''result=''for i in s:
    
    index=index+1
    if index%17==0:
        index=1
        print(ss)
        print(ss[8:])
        tar='0b'+ss[8:]
        result=result+chr(eval(tar)) 
        ss=i        
    else:
        ss=ss+i

tar='0b'+ss[8:]result=result+chr(eval(tar))print(result)


发表评论

访客

◎欢迎参与讨论,请在这里发表您的看法和观点。