misceasy

Закодированный мопс (Encoded Pug)

hackerlab

Task: Decode a 111MB file with multi-layer encoding to find a hidden flag. Solution: Sequential decoding (Base64 → Binary → Octal → ZIP → HEX → PNG), then extract hidden PNG after IEND chunk and XOR both images to reveal LSB-hidden flag.

$ ls tags/ techniques/
Multi-layer encoding chain (Base64 → Binary → ASCII → Octal → ZIP → HEX → PNG)PNG file structure analysis (IEND chunk trailer detection)Image steganography via LSB XOR differenceVisual steganography (flag visible in image difference)

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]