Rating:

1. Open on site ***"http://194.5.207.57/"*** page ***"/about.html"***
2. Open view-source the site. In the code we'll see string with base64

![](https://i.imgur.com/UKd9rgI.png)

Decoder we get a link to the site
```
echo "aHR0cHM6Ly9tZWdhLm56L2ZpbGUvUTVaR1dMNWEjcW04Y20tV2ZVVVZMbGUyaTA2ZVJITkc0eFRwNjlRY0tJV0JaUmtGSFktVQ==" | base64 --decode
https://mega.nz/file/Q5ZGWL5a#qm8cm-WfUUVLle2i06eRHNG4xTp69QcKIWBZRkFHY-U
```
3. On the site need to download a picture
4. We parse the picture using the "binwalk tool"
```
binwalk --dd='.*' imitation-game.jpg

DECIMAL HEXADECIMAL DESCRIPTION
--------------------------------------------------------------------------------
0 0x0 JPEG image data, JFIF standard 1.02
6423339 0x62032B Zip archive data, at least v2.0 to extract, uncompressed size: 212356, name: Movies, Myth, and the National Security State.pdf
6619519 0x65017F End of Zip archive, footer length: 22

```
And we see several files including the archive.
In the archive have pdf file extract it.

5. We parse the pdf file using any site for example https://pdfcandy.com/result/889835650fb76e30.html
In the archive we found pictures

![](https://i.imgur.com/dPy3Uhb.png)

6. From these pictures we collect a phrase using the site
https://questhint.ru/hexahue/
The pfrase is "14mp455w0rd"

7. Looking at the first picture that was at the very beginning and look for hidden files using the "steghide tool" and a passphrase "14mp455w0rd" and found txt file with the flag
```
steghide extract -sf imitation-game.jpg
Enter passphrase:
wrote extracted data to "flag.txt".
```
```
cat flag.txt
TMUCTF{C41rncr055_15_4_50v137_5py!}
```