Forensics

{"authors": ["ret2basic", "y4y"]}

information (Exiftool)

Solved by ret2basic

Challenge

Files can always be changed in a secret way. Can you find the flag? cat.jpg

Solution

Run exiftool:

The selected string is in Base64 encoding.

Weird File (Microsoft Word => View Macros)

Solved by ret2basic

Challenge

What could go wrong if we let Word documents run programs? (aka "in-the-clear"). Download file.

Solution

Open the Word document and go to "View -> Macros -> runpython -> Edit":

The selected string is in Base64 encoding.

Matryoshka doll (Binwalk)

Solved by ret2basic

Challenge

Matryoshka dolls are a set of wooden dolls of decreasing size placed one inside another. What's the final one? Image: this

Solution

Use binwalk -e <filename> four times.

tunn3l v1s10n (GIMP)

Solved by y4y

Challenge

We found this file. Recover the flag.

Solution

This has got to be one of the most rediculous problem I've ever done, I wanted to say this is hyper unrealistic but it actually has some references to.

After downloading this file, and do a file command on it, I found it's just data.

But doing strings command also found nothing as there was no noticable file signatures. I have no idea how, but I remembered one of the HackTheBox machine I did a long time ago, which the privilege escalation step would exploit the video group of a low-privileged user. Hacktricks does a wonderful job explaining it, and in fact, they have a lot of great pentest tips and tricks.

If you read the Hacktricks page, you would know. Download GIMP and follow the guide. Eventually you get an image with flag on it:

Wireshark doo dooo do doo... (Wireshark => Follow TCP Stream)

Solved by ret2basic

Challenge

Can you find the flag? shark1.pcapng.

Solution

Follow TCP stream:

The highlighted string is ROT13 encoded.

MacroHard WeakEdge (PowerPoint <=> Zip)

Solved by ret2basic

Challenge

I've hidden a flag in this file. Can you find it? Forensics is fun.pptm

Solution

Unzip the PowerPoint file. The message is located in ppt/slideMasters/hidden. Remove spaces and Base64 decode it.

Trivial Flag Transfer Protocol (Wireshark => Export TFTP Objects)

Solved by ret2basic

Challenge

Figure out how they moved the flag.

Solution

Go to "Wireshark => Export Objects => TFTP...":

Then click Save All:

Here we get three images, two encrypted messages, as well as a file named program.deb. Note that those two encrpyted messages are simply ROT13 encrypted. ROT13 decryption gives us the following messages:

  1. Instruction: TFTP doesn't encrypt our traffic, so we must disguise our flag transfer. Figure out away to hide the flag and I will check back for the plan.

  2. Plan: I used the program and hide it with - DUEDILIGENCE. Check out the photos.

Extract program.deb:

mkdir tmp ; dpkg-deb -R program.deb tmp

Note that tmp/usr/bin contains steghide. It turns out that we could use the password DUEDILIGENCE to extract the flag from picture3.bmp:

Wireshark twoo twooo two twoo... ()

Solved by ret2basic

Challenge

Can you find the flag? shark2.pcapng.

Solution

Disk, disk, sleuth! (strings)

Solved by ret2basic

Challenge

Use srch_strings from the sleuthkit and some terminal-fu to find a flag in this disk image: dds1-alpine.flag.img.gz

Solution

Decompress:

gunzip dds1-alpine.flag.img.gz

Search for human-readable strings:

strings dds1-alpine.flag.img | grep pico

Disk, disk, sleuth! II (Autopsy)

Solved by ret2basic

Challenge

All we know is the file with the flag is named down-at-the-bottom.txt... Disk image: dds2-alpine.flag.img.gz

Solution

Open the image in Autopsy and search for down-at-the-bottom.txt:

Surfing the Waves

Someone, solve it!

Challenge

While you're going through the FBI's servers, you stumble across their incredible taste in music. One main.wav you found is particularly interesting, see if you can find the flag!

Solution

Todo!

Milkslap (Zsteg)

Solved by ret2basic

Challenge

🥛

Solution

Download the image:

wget http://mercury.picoctf.net:7585/concat_v.png

Run zsteg:

zsteg concat_v.png

Very very very Hidden

Someone, solve it!

Challenge

Finding a flag may take many steps, but if you look diligently it won't be long until you find the light at the end of the tunnel. Just remember, sometimes you find the hidden treasure, but sometimes you find only a hidden map to the treasure. try_me.pcap

Solution

Todo!

Last updated