Skip to content

Latest commit

 

History

History
40 lines (26 loc) · 1.81 KB

forensics.md

File metadata and controls

40 lines (26 loc) · 1.81 KB

TJCTF 2023 – Forensics Challenges

#1: beep-boop-robot

Description/Sources

Screenshot 2023-05-26 at 22 09 18

robot.mp4
  • Decoding the Morse code signals in the file either by hand or using an online decoder gives the following message
.... .. / .... --- .-- / .- .-. . / -.-- --- ..- / -.. --- .. -. --. .-.-.- / - .... . / ..-. .-.. .- --. / .. ... / - .--- -.-. - ..-. - .... .. ... .. ... .- .-.. .-.. --- -. . .-- --- .-. -.. .-.. -- .- ---
  • This translates to: HI HOW ARE YOU DOING. THE FLAG IS TJCTFTHISISALLONEWORDLMAO

Flag

tjctf{thisisallonewordlmao}

#2: nothing-to-see

Description/Sources

Screenshot 2023-05-26 at 22 10 12

nothing.png

nothing

  • Using binwalk on the image, we can extract an underlying password-protected zip file. Checking the EXIF of the original image using exiftool gives:

    Screenshot 2023-05-26 at 18 12 39

  • The title of the image is indicated as panda_d02b3ab3. Use this as the password and unlock the zip file, which gives flag.txt file with the flag.

Flag

tjctf{the_end_is_not_the_end_4c261b91}