# cat blog >> /dev/brain 2> /proc/mind
cat blog >> /dev/brain 2> /proc/mind
# ./keygen 4 "{a..z}" | xargs -I {} steghide extract -sf stega4.wav -p {} wrote extracted data to "flag.zip". # fcrackzip -u -c aA1! -p aaaaa flag.zip PASSWORD FOUND!!!!: pw == 3L33t # unzip -P 3L33t flag.zip && cat flag.txt Archive: flag.zip inflating: flag.txt The Flag is {a57085396f9200c6d38ff66ffa1d3c71}
./keygen 4 "{a..z}" | xargs -I {} steghide extract -sf stega4.wav -p {}
fcrackzip -u -c aA1! -p aaaaa flag.zip
unzip -P 3L33t flag.zip && cat flag.txt
Post a Comment
No comments:
Post a Comment