下载附件,得到一张图片

图片题先看属性后lsb,啥都没看出来,用万能的010打开

康康我发现了什么,看起来藏了个压缩包,这个手动分离不太好操作,于是打开kali,用foremost -T指令进行分离,得到一个压缩包

先010打开,发现是伪加密

得到一个vmdk文件,这里显示了在虚拟机能打开

但是我之前实际操作没能正确打开,隐约记得这好像是个磁盘类文件,应该可以用foremost?
好吧并不能,于是我找到了虚拟机的磁盘目录,把这个文件丢了进去,也没弄出来

等等…我记得好像7-zip能分离它
7z x

有两个文件夹


这几把是什么

这个我熟,脑交是吧(?
网站:https://www.splitbrain.org/services/ook

找到另一个文件夹

这个好像也是brainfuck

flag{N7F5_AD5_i5_funny!}