23

buuctf-misc-刷新过的图片

 3 years ago
source link: http://www.cnblogs.com/junlebao/p/13837897.html
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client

知识点:F5隐写

kali中安装F5-steganography 工具

git clone https://github.com/matthewgao/F5-steganography

解密的时候输入:

java Extract /图片的绝对路径 [-p 密码] [-e 输出文件]

本题就是利用kali下的工具解密的

我们将图片拖进kali

通过上面的命令

Nfu2amY.png!mobile

然后我们进入,F5-steganogtaphy目录中,查看output.txt,linux中查看txt文件,不行,我们拖到window中

7R77Bfz.png!mobile

然后再用hxd看看有什么

发现是5048开头的文件这不就是zip吗?

VvQVNn3.png!mobile

而且还发现了伪加密,直接将01改成00然后保存,改扩展名为.zip格式,然后解压,获得

flag{96efd0a2037d06f34199e921079778ee}


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK