2023-11-12|閱讀時間 ‧ 約 2 分鐘

information

題目圖示

Hints

1. Look at the details of the file

2. Make sure to submit the flag as picoCTF{XXXXX}

解題步驟

  1. wget https://mercury.picoctf.net/static/149ab4b27d16922142a1e8381677d76f/cat.jpg
  2. exiftool cat.jpg
  3. 你會在終端機上看到這個
  4. 執行 echo cGljb0NURnt0aGVfbTN0YWRhdGFfMXNfbW9kaWZpZWR9 | base64 -d
    NOTED: 因為 cGljb0NURnt0aGVfbTN0YWRhdGFfMXNfbW9kaWZpZWR9 看起來就是 Base64 編碼。

Useful Stuffs

1. https://www.linuxadictos.com/zh-TW/exiftool-visualiza-los-datos-exif-de-tus-imagenes-desde-la-terminal.html

2. https://www.runoob.com/linux/linux-shell-echo.html

3. https://shengyu7697.github.io/linux-base64/

4. https://zh.wikipedia.org/wiki/Exif

5. https://exiftool.org/

6. https://security.stackexchange.com/questions/3989/how-to-determine-what-type-of-encoding-encryption-has-been-used

分享至
成為作者繼續創作的動力吧!
© 2024 vocus All rights reserved.