sameer fakhoury
  • Home
  • CTF Writeups
  • Course Summaries
  • Cyber Reports
  • Articles
  • Event Notes
  • About Me
Raj

Raj

Level
easy
Type
Forensics

The secret remains hidden, but as we attempted to send the image, it was mysteriously corrupted during transmission, scattered in the wild. Can you piece together what was lost?

image
  1. Check the File Type, Since the image won't open, check its file type to verify its actual format.
  2. file image.dat
    image.dat: data
  3. Search for Suspicious Strings, Use strings to search for readable strings that might give clues.
  4. strings image.dat | tail
    (>&KNZQ[sOY
    XbL#
    Fg)Q
    ed#\
    SWa.,l
    VeW:R
    R#ka
    *@[@
    z\^4
    https://pastebin.com/YEP3217j
  5. Inspect the Link, Visit the link found in the strings output. It asks for a password.
  6. image
  7. Inspect the File Header, Check the file’s header to verify if it's a JPEG and if there's any corruption, 464a 4649 is FJFI, a corruption of the expected JFIF JPEG header.
  8. xxd -l 100 image.dat
    00000000: d8ff e0ff 1000 464a 4649 ...
  9. Analyze Endianness Swap, Suspect a byte-order swap (endianness). Clue: "Raj" (India) could be a pun/hint about "Endian".
  10. Use CyberChef to reverse endianness and try to restore the image:
    • Load image.dat
    • Use Swap Endianness recipe
    • Re-render and download the corrected image
    • image
  11. Retrieve the Password from the Image, Once the image is correctly displayed, inspect it visually or analyze metadata/embedded data to get the password. 0qQ0Zh3pMG
  12. Access the Pastebin Link
    • Use the password from the image to unlock the pastebin.
    • Retrieve the flag from the page.
    • image
  13. Flag: YUCTF{pixels_hide_secrets}

©sameer fakhoury

GitHubLinkedIn