M0rsArchive

Great challenge to test your programming skills. Indeed, PIL is all you need to solve this, but you have to get a little bit creative.

Very cool challenge, I enjoyed the process, and found a cool but easy way to bypass the always changing values.
Thank you @swani really cool one :wink:

It looks daunting at first, but it is actually not too difficult.

The key is to simplify everything as much as you can before processing.

Honestly one of the most fun challenges I’ve done in a while.
PIL really is all you need. Just don’t overthink what you’re trying to do.
PM for help.

Tried manually doing the first level to get a feel, but even that password doesn’t seem to work. I think I need a nudge.

Anyone else having trouble with file 986? PW in image does not match the archive if you do it the same way as for the other files…

…nvm, I was retarded. Thanks @HKLM

Type your comment> @Ljugtomten said:

Anyone else having trouble with file 986? PW in image does not match the archive if you do it the same way as for the other files…

…nvm, I was retarded. Thanks @HKLM

For those wondering, I had the same issue and it had to be in lowercase.

By the way, great challenge ! Very nice to train your dev skills.
I won’t call it easy challenge tho.

@Crafty said:

Type your comment> @Ljugtomten said:

Anyone else having trouble with file 986? PW in image does not match the archive if you do it the same way as for the other files…

…nvm, I was retarded. Thanks @HKLM

For those wondering, I had the same issue and it had to be in lowercase.

Had that issue too.

Finally finished this one. Not too difficult once I actually read the name of the challenge. Annoyingly, after the first 200 archives, it would fail to read the password every 100 or so and I’d have to restart it, not sure why.

Is there anyone have trouble with file 497 ? My script doesn’t give a correct password. I tried to extract the morse code manually, and i got sihhhi************siihssh, but still incorrect.

It was a fun coding exercise. Working out an algorithm to distinguish the Morse code pixel from the background pixel was especially rewarding after you realized the colors may all looked similar to the naked eye until you zoomed in to the pixel level.

Type your comment> @htw6666 said:

Is there anyone have trouble with file 497 ? My script doesn’t give a correct password. I tried to extract the morse code manually, and i got sihhhi************siihssh, but still incorrect.

The trick is you need to make your OCR function adaptable for any change it may happen in the image. Try to see what patterns appear and apply them in order to decode it correctly

Was fun… :slight_smile: around 100 lines of python
@Crafty thanks for the hint

What a awesome challenge! I really enjoyed this one!

was pretty fun. I used perl instead of python. I couldn’t get OCR to work so did it probably an over-complicated way but got it in the end.

For those not inclined toward perl or python solutions, you can make partial solution work using shell commands. It won’t be pretty. But basically, consider that there are some old image file formats that lend themselves to much easier cut⦚ing and typical unix-y text processing.

■■■, I started the challenge right now :slight_smile: it is going to be fun :).

Type your comment> @Crafty said:

Type your comment> @Ljugtomten said:

Anyone else having trouble with file 986? PW in image does not match the archive if you do it the same way as for the other files…

…nvm, I was retarded. Thanks @HKLM

For those wondering, I had the same issue and it had to be in lowercase.

By the way, great challenge ! Very nice to train your dev skills.
I won’t call it easy challenge tho.

Thanks for this one!

Finding the best method to retrieve the password was the hardest part.
Tried to Google OCR solutions, but this was taking me way to far. Decided to go back to the basics and think about fg and bg colours.

Once I got the Python script ready to get the password, I used my solution for the Eternal Loop challenge to automate the unzipping.

easy, all it took were the 20 most cursed lines of python you’ll never see ???
i enjoy challenges like this, they’re great practice for hacking together quick and dirty scripts for weird real world situations in which you encounter weirdly formatted data

Really nice challenge! I enjoyed in this one!
Good to learn different things.

Wrote script that works up until flag_986 where it fails, even manually.
Edit: seems like we are case sensitive.