Tags: steganography png forensics 

Rating:

# Dimensionless Loading
## Misc
We're given a PNG with the width and height fields set to 0. However, the original CRC is intact. The CRC is a unique value used to check for the integrity of the preceeding chunk, similar to a hash funciton. Because of this, we can 'crack' the original dimensions with this:
```py
from zlib import crc32
from pwn import p32
target = 0x5b8af030
header = "49 48 44 52 00 00 00 99 00 00 00 99 08 06 00 00 00".replace(' ', '').decode('hex')
def check_size(w,h, header):
w = p32(w)[::-1]
h = p32(h)[::-1] header = header.replace("\x00\x00\x00\x99" + "\x00\x00\x00\x99", w+h)
if crc32(header) == target:
print(list(w),list(h)) for x in range(2000):
for y in range(2000):
check_size(x,y,header)
```
Sizes are: 0x00 0x00 0x05 0x62 0x00 0x00 0x01 0x6B
Adding this back to the image, we get the original image, containing the flag.
[IMAGE HERE]

# `ractf{m1ss1ng_n0_1s_r34l!!}`

Original writeup (https://github.com/TheWinRaRs/Writeups/blob/master/RACTF/Forensics/dimensionless_loading.md).