parent
93974b52a3
commit
124fd71813
@ -0,0 +1,13 @@
|
||||
#!/bin/python
|
||||
from PIL import Image, ImageColor
|
||||
|
||||
im = Image.new('1', (4000,4000), 'white')
|
||||
|
||||
with open('secret_map.txt', 'r') as f:
|
||||
while (cl := f.readline()):
|
||||
painting = cl.split(" ", 1)
|
||||
im.putpixel((int(painting[1], 16),int(painting[0], 16)), ImageColor.getcolor('black', '1'))
|
||||
|
||||
im.save('maybe.png')
|
||||
|
||||
# 247CTF{0c895fb57954df7f83756e1f7718e661}
|
@ -0,0 +1,5 @@
|
||||
- To get the flag, trigger the population of the flag into the session var of flask.
|
||||
- For that to happen go to https://7675753c5dfaee11.247ctf.com/flag?secret_key=xxxx
|
||||
- Now go to the web inspector and get the session cookie value
|
||||
- reverse base64 encodeing two times in a row
|
||||
- done
|
Loading…
Reference in new issue