misceasy
Закодированный мопс (Encoded Pug)
hackerlab
Task: Decode a 111MB file with multi-layer encoding to find a hidden flag. Solution: Sequential decoding (Base64 → Binary → Octal → ZIP → HEX → PNG), then extract hidden PNG after IEND chunk and XOR both images to reveal LSB-hidden flag.
$ ls tags/ techniques/
zipbase64exiftoollsbpnghidden_datamulti_layer_encodingbinaryoctalheximage_steganographyxoriend_chunk
Multi-layer encoding chain (Base64 → Binary → ASCII → Octal → ZIP → HEX → PNG)PNG file structure analysis (IEND chunk trailer detection)Image steganography via LSB XOR differenceVisual steganography (flag visible in image difference)
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]