easy-steg

This challenge only gives an image and this short description:

Get the flag.

Running strings on this image gives us some binary data.

$ strings ./meme_not_here.jpg   
?gMC
[...]
<}*_
01000110 01110010 01110010 00101100 00100000 01100111 01100010 00100000 01110100 01110010 01100111 00100000 01100111 01110101 01110010 00100000 01110011 01111001 01101110 01110100 00100000 01101010 01101110 01100110 00100000 01110010 01101110 01100110 01101100 00111010 00100000 01101110 01101111 01100110 01100010 00101101 01100111 01110010 01110000 01110101 01111011 01010010 01101110 01100110 01001100 01011111 01100110 01100111 01010010 01010100 01011111 01110011 01011001 01001110 01110100 01111101

Binary data, which decodes to Frr, gb trg gur synt jnf rnfl: nofb-grpu{RnfL_fgRT_sYNt} . Decoding this from Rot13 gives us the final flag: See, to get the flag was easy: abso-tech{EasY_stEG_fLAg}

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.