misc-steganography 用虚拟机kali的方法一、修复 7z 文件头python3 -c dopen(steganography_challenge,rb).read();open(fixed.7z,wb).write(b\x37\x7a\xbc\xafd[4:])二、解压 7z 得到 layer2.png7z x fixed.7z三、用 zsteg 提取 LSBzsteg -a layer2.pngzsteg -e b1,rgb,lsb,xy layer2.png lsb.bin四、提取 ZIP跳过前4 字节dd iflsb.bin ofouter.zip bs1 skip4五、解压 outer.zip得到flag.zippass1.zip ~ pass6.zip六、CRC32 爆破Kali 脚本新建 crack.pypython import zlib import string from itertools import product def crack(crc): for s in product(string.printable, repeat4): s .join(s) if zlib.crc32(s.encode()) 0xffffffff crc: return s return None for i in range(1,7): with open(fpass{i}.zip,rb) as f: crc int.from_bytes(f.read()[14:18],little) print(fpass{i}:, crack(crc))运行python3 crack.py1pass2is3-6c1!xxLf%fXYpkaA拼接得到密码pass is c1!xxLf%fXYpkaA得到 flag.txt七、运行代码得到flagtext open(flag.txt, r, encodingutf-8).read() binary text.replace(\u200b,0).replace(\u200c,1) flag .join( chr(int(binary[i:i8],2)) for i in range(0,len(binary),8) ) print(flag)得到flag
软件系统安全赛初赛misc题-steganography wp
misc-steganography 用虚拟机kali的方法一、修复 7z 文件头python3 -c dopen(steganography_challenge,rb).read();open(fixed.7z,wb).write(b\x37\x7a\xbc\xafd[4:])二、解压 7z 得到 layer2.png7z x fixed.7z三、用 zsteg 提取 LSBzsteg -a layer2.pngzsteg -e b1,rgb,lsb,xy layer2.png lsb.bin四、提取 ZIP跳过前4 字节dd iflsb.bin ofouter.zip bs1 skip4五、解压 outer.zip得到flag.zippass1.zip ~ pass6.zip六、CRC32 爆破Kali 脚本新建 crack.pypython import zlib import string from itertools import product def crack(crc): for s in product(string.printable, repeat4): s .join(s) if zlib.crc32(s.encode()) 0xffffffff crc: return s return None for i in range(1,7): with open(fpass{i}.zip,rb) as f: crc int.from_bytes(f.read()[14:18],little) print(fpass{i}:, crack(crc))运行python3 crack.py1pass2is3-6c1!xxLf%fXYpkaA拼接得到密码pass is c1!xxLf%fXYpkaA得到 flag.txt七、运行代码得到flagtext open(flag.txt, r, encodingutf-8).read() binary text.replace(\u200b,0).replace(\u200c,1) flag .join( chr(int(binary[i:i8],2)) for i in range(0,len(binary),8) ) print(flag)得到flag