Steganography
Last updated
Last updated
Attachment: QR.wav
Solution:
Unintended way, use image viewer in Linux machine. Scan QR with your flag.
Other method, change the file format to image format (jpeg,png,jpg). Scan the image.
Flag: CYBER{QR_C0D3_E45Y_R1GH7?}
Attachment: louder.wav
Solution:
For this challenge, the admin drop the hint for it.
From here, it mentions about deep, and tools given. Before the workshop begin, there was 1 tool provided by organizer which is Deep sound. It like what this admin try to tell us.
Extract the file hidden by clicking extract secret file on top right corner.
History.txt
Secret History
Refer to 2nd hint, it mentions about book. Let give a look on book cipher.
Flag: CYBER{R3AD_TH3_HISTORY}
Attachment: alien.wav
Solution:
This challenge is audio challenge and admin give the hint about this.
Weird sound and spect? Looking around spect may refer to spectrogram that use for audio steganography. Using audacity.
Flag: CYBER{ALW4Y5_SP3CT0GR4M_TH3_4UD10}
Attachment: zchallenge.png
Solution:
This challenge considers as Hard challenge since it consists multiple technique in one challenge.
i. Check The file.
ii. Change to right file format.
iii. Binwalk to check attachment folder.
iv. Checking embedded file
The information show that this image has embedded file, let find the passphrase. Since it mentions about uniten. Let have some guess.
Uniten
uniten
uni10
Uni10
Manage to extract pass.txt using uni10 as passphrase.
Since the zip in 7zip, we cannot extract it using unzip command and to bruteforce the password, we need to change into hash. Using John the ripper to convert file into hash.
Crack the hash using pass.txt we have earlier.
Using the password to crack the 7zip file.
Flag: CYBER{P1K4_P1KA_PIK4CHU_ASH_M3}