28 lines
629 B
Markdown
28 lines
629 B
Markdown
## Panda
|
|
The main idea finding the flag is using zip2john.
|
|
|
|
#### Step-1:
|
|
After I downloaded `panda.zip`, I got 2 files in it, `panda.jpg` & `panda1.jpg`.
|
|
|
|
#### Step-2:
|
|
It was encrypted. So I used `zip2john` tool to crack the zip.
|
|
|
|
```bash
|
|
zip2john panda.zip > hash.txt
|
|
john.exe --wordlist=real_human hash.txt
|
|
```
|
|
<img src="panda.jpg">
|
|
|
|
<img src="panda1.jpg">
|
|
|
|
#### Step-3:
|
|
|
|
This simple `flag.py` python script helps us to get the flag.
|
|
|
|
```python
|
|
print(''.join([chr(i) for i, j in zip(open('panda1.jpg', 'rb').read(), open('panda.jpg', 'rb').read()) if i!= j]))
|
|
```
|
|
|
|
#### Step-4:
|
|
Finally the flag becomes:
|
|
`csictf{kung_fu_p4nd4}` |