miscProeasy
Закодированный мопс (Encoded Pug)
hackerlab
Task: Decode a 111MB file with multi-layer encoding to find a hidden flag. Solution: Sequential decoding (Base64 → Binary → Octal → ZIP → HEX → PNG), then extract hidden PNG after IEND chunk and XOR both images to reveal LSB-hidden flag.
$ ls tags/ techniques/
zipbase64exiftoollsbpnghidden_datamulti_layer_encodingbinaryoctalheximage_steganographyxoriend_chunk
Multi-layer encoding chain (Base64 → Binary → ASCII → Octal → ZIP → HEX → PNG)PNG file structure analysis (IEND chunk trailer detection)Image steganography via LSB XOR differenceVisual steganography (flag visible in image difference)
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [stego][Pro]Подпись (Signature)— hackerlab
- [crypto][Pro]Одноразовый блокнот (One-Time Pad)— hackerlab
- [misc][Pro]Карусель (Karusel)— hackerlab
- [stego][Pro]Лисичка (Fox)— hackerlab
- [misc][Pro]По крупицам (Bit by Bit)— hackerlab