文章预览
hiden 文本rot47后rot13, 使用python脚本逆推。 import wave with wave.open( "hiden.wav" , "rb" ) as wav_file: wav_data = bytearray(wav_file.readframes( -1 )) # Read all audio frames length_bytes = bytearray([wav_data[i * 4 ] for i in range( 3 )]) data_length = int.from_bytes(length_bytes, 'little' ) extracted_data = bytearray() for i in range(data_length): extracted_data.append(wav_data[(i + 3 ) * 4 ]) extracted_text = extracted_data.decode( 'utf-8' ) print( "Content:\n" , extracted_text) 输出内容如下: ok,now you find me,so the flag give you DASCTF{12jkl-456m78-90n1234} miaoro 追踪HTTP流: shiro爆破密码 得到/flag1/DASCTF{B916CFEB-C40F-45D6-A7BC-/Miao49757142263800 继续分析: 解密: 数据解密: 文件修改高度: 在B站找到对应文字得到完整flag 不一样的数据库_2 解压得到二维码,修复 NRF@WQUKTQ12345 @WWWFX#WWQXNWXNU rot13: 使用密码登录找
………………………………