Here is a tiny file that you might find fun to do while cramming other forms of knowledge in your head. :D
All the best for your exams.
- Flag Format: /flag{.+}/
Provided text.bmp
Solution
This is a simple question meant to be a refresher while the examinations are going on.

This does not show anything other than the fact that most of the file is empty. Which actually makes the job easier. On opening the file in binary mode, we confirm this.
00000000: 424d 6675 0000 0000 0000 3600 0000 2800 BMfu......6...(.
00000010: 0000 6400 0000 6400 0000 0100 1800 0000 ..d...d.........
00000020: 0000 3075 0000 c30e 0000 c30e 0000 0000 ..0u............
00000030: 0000 0000 0000 0000 0000 0000 0000 0000 ................
00000040: 0000 0000 0000 0000 0000 0000 0000 0000 ................
00000b40: 0000 0000 0000 0000 0000 0000 0000 0000 ................
00000b50: 0000 0000 0000 0000 7d50 3a00 0000 0000 ........}P:.....
00000b60: 0000 0000 0000 0000 0000 0000 0000 0000 ................
00000b70: 0000 0000 0000 0000 0000 0000 0000 0000 ................
00000b80: 0000 0000 0000 0000 0000 0000 0000 0000 ................
00000b90: 0000 0000 0000 0000 0000 0000 0000 0000 ................
00000ba0: 0000 0000 0000 0000 0000 0000 0000 0000 ................
...
00000e70: 0000 0000 0000 0000 0000 0000 0000 0000 ................
...
000074b0: 0000 0000 0000 0000 0000 0000 0000 0000 ................
000074c0: 0000 0000 0000 0000 0000 0000 0000 0000 ................
000074d0: 616c 6600 0000 0000 0000 0000 0000 0000 alf.............
000074e0: 0000 0000 0000 0000 0000 0000 0000 0000 ................
000074f0: 0000 0000 0000 0000 0000 0000 0000 0000 ................
...
However we also see some text scattered in the middle. Which seems interesting.
We try to read the data in the files.
$ cat text.bmp
BMfu6(dd0u}P:smroFynaMnIsemoCongetS{galf
That seems interesting enough. It simply the reversed string of our flag.
}P:smroFynaMnIsemoCongetS{galf
Flag
flag{StegnoComesInManyForms:P}
Recommended Reading
Royal Primes
#ctf #misc #rsac = 2911901299590689319468053634625275622654003904978205739380623481723661641396883678700531176998074009090944130064383792213854734101182591054606781359574544120823690362905523398270489939706547990345246231530733316646360394579721797156381054207414615333776383945252214100458075195770993971636731892198913293107313263096802400950280001995889600269261084002962194522369348371580184194201319826916320073496756736378234176527727677896098180012125139057850531341929674855173384488699967535868594673470466436155672157436157446615623094626238560694456848398206751930925254978950059694877328019092454478343535457958785859310484
...Recommended Reading
Kill My Linux
#ctf #reverseSo I have another reverse question. This one should be easy, all you have to do is to let this binary run, and it will eventually print the correct answer. :)
- Hint : The binary is dynamically linked.
-
Hint : How is the executable crashing...