miscProeasy

Закодированный мопс (Encoded Pug)

hackerlab

Task: Decode a 111MB file with multi-layer encoding to find a hidden flag. Solution: Sequential decoding (Base64 → Binary → Octal → ZIP → HEX → PNG), then extract hidden PNG after IEND chunk and XOR both images to reveal LSB-hidden flag.

$ ls tags/ techniques/
Multi-layer encoding chain (Base64 → Binary → ASCII → Octal → ZIP → HEX → PNG)PNG file structure analysis (IEND chunk trailer detection)Image steganography via LSB XOR differenceVisual steganography (flag visible in image difference)

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups