investigative reversing 1/2
This commit is contained in:
0
investigative_reversing_2/.ghidra.test.lock~~
Normal file
0
investigative_reversing_2/.ghidra.test.lock~~
Normal file
BIN
investigative_reversing_2/encoded.bmp
Executable file
BIN
investigative_reversing_2/encoded.bmp
Executable file
Binary file not shown.
|
After Width: | Height: | Size: 1.4 MiB |
9
investigative_reversing_2/investigative_reversing_2.lock
Normal file
9
investigative_reversing_2/investigative_reversing_2.lock
Normal file
@@ -0,0 +1,9 @@
|
||||
#Ghidra Lock File
|
||||
#Mon Jun 10 10:48:05 CEST 2024
|
||||
OS\ Name=Windows 11
|
||||
OS\ Version=10.0
|
||||
Username=Maxime Vorwerk
|
||||
Hostname=MAXIMESLAPTOP
|
||||
<META>\ Supports\ File\ Channel\ Locking=File Lock
|
||||
OS\ Architecture=amd64
|
||||
Timestamp=6/10/24, 10\:48 AM
|
||||
@@ -0,0 +1,11 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<FILE_INFO>
|
||||
<BASIC_INFO>
|
||||
<STATE NAME="CONTENT_TYPE" TYPE="string" VALUE="Program" />
|
||||
<STATE NAME="PARENT" TYPE="string" VALUE="/" />
|
||||
<STATE NAME="FILE_ID" TYPE="string" VALUE="c0a8b2a0d1e93211312676400" />
|
||||
<STATE NAME="FILE_TYPE" TYPE="int" VALUE="0" />
|
||||
<STATE NAME="READ_ONLY" TYPE="boolean" VALUE="false" />
|
||||
<STATE NAME="NAME" TYPE="string" VALUE="mystery" />
|
||||
</BASIC_INFO>
|
||||
</FILE_INFO>
|
||||
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
@@ -0,0 +1,4 @@
|
||||
VERSION=1
|
||||
/
|
||||
NEXT-ID:0
|
||||
MD5:d41d8cd98f00b204e9800998ecf8427e
|
||||
@@ -0,0 +1,5 @@
|
||||
VERSION=1
|
||||
/
|
||||
00000000:mystery:c0a8b2a0d1e93211312676400
|
||||
NEXT-ID:1
|
||||
MD5:d41d8cd98f00b204e9800998ecf8427e
|
||||
@@ -0,0 +1,2 @@
|
||||
IADD:00000000:/mystery
|
||||
IDSET:/mystery:c0a8b2a0d1e93211312676400
|
||||
@@ -0,0 +1,6 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<FILE_INFO>
|
||||
<BASIC_INFO>
|
||||
<STATE NAME="OWNER" TYPE="string" VALUE="MaximeVorwerk" />
|
||||
</BASIC_INFO>
|
||||
</FILE_INFO>
|
||||
@@ -0,0 +1,4 @@
|
||||
VERSION=1
|
||||
/
|
||||
NEXT-ID:0
|
||||
MD5:d41d8cd98f00b204e9800998ecf8427e
|
||||
@@ -0,0 +1,4 @@
|
||||
VERSION=1
|
||||
/
|
||||
NEXT-ID:0
|
||||
MD5:d41d8cd98f00b204e9800998ecf8427e
|
||||
BIN
investigative_reversing_2/mystery
Executable file
BIN
investigative_reversing_2/mystery
Executable file
Binary file not shown.
19
investigative_reversing_2/sol.py
Executable file
19
investigative_reversing_2/sol.py
Executable file
@@ -0,0 +1,19 @@
|
||||
#!/home/maxime/.pyvenv/bin/python3
|
||||
|
||||
with open("encoded.bmp", 'rb') as f:
|
||||
img = f.read()
|
||||
flag_len = 50
|
||||
stego_len = flag_len * 8
|
||||
stego_start = 2000
|
||||
encoded_bytes = img[stego_start:stego_start + stego_len]
|
||||
|
||||
flag_buffer = [''] * flag_len
|
||||
for i, flag_char in enumerate(flag_buffer):
|
||||
char = 0
|
||||
for j in range(8):
|
||||
img_char = encoded_bytes[i*8+j]
|
||||
char |= (img_char & 1) << j
|
||||
flag_buffer[i] = chr(char + 5)
|
||||
|
||||
print(''.join(flag_buffer))
|
||||
|
||||
Reference in New Issue
Block a user