Next challenge complete

master
Toerd@archlinux 4 years ago
parent 93974b52a3
commit 124fd71813

@ -0,0 +1,13 @@
#!/bin/python
from PIL import Image, ImageColor
im = Image.new('1', (4000,4000), 'white')
with open('secret_map.txt', 'r') as f:
while (cl := f.readline()):
painting = cl.split(" ", 1)
im.putpixel((int(painting[1], 16),int(painting[0], 16)), ImageColor.getcolor('black', '1'))
im.save('maybe.png')
# 247CTF{0c895fb57954df7f83756e1f7718e661}

@ -0,0 +1,5 @@
- To get the flag, trigger the population of the flag into the session var of flask.
- For that to happen go to https://7675753c5dfaee11.247ctf.com/flag?secret_key=xxxx
- Now go to the web inspector and get the session cookie value
- reverse base64 encodeing two times in a row
- done
Loading…
Cancel
Save