CTFLearn write-up: Forensics (Easy)
3 minutes to readGreeting there, welcome to another CTFLearn write-up. Well, it has been a while since my last walkthrough on the binary and cryptography. So, I’m going to do more bundle walkthrough on the CTFLearn. As for today, we will go through the easy Forensics and most of the tasks contain basic steganography. Enjoy!
1) Forensics 101
Link: https://ctflearn.com/challenge/96
If you are a Linux user, use strings command. E.g.
strings minion.jpg
This is the easiest way to hide your data inside the image.
2) Taking LS
Link: https://ctflearn.com/challenge/103
I guess this is the easiest task in the entire forensics. You don’t need any prior knowledge of extracting the flag. Simply unzip the file, read the password and extract the PDF.
3) Binwalk
Link: https://ctflearn.com/challenge/108
For this task, you are required to use a stego tool called binwalk. For Linux (Ubuntu or Kali) user. install the tool with the following command.
sudo apt-get install binwalk
Let’s find out what is inside the image using the binwalk.
Well, well, well. We have a hidden PNG image inside another PNG image. You can use –extract option to extract the files but I prefer adding –dd flag to extract all files. The command will look like this.
binwalk --extract --dd=".*" PurpleThing.jpeg
Read the hidden PNG inside the extracted directory/folder.
4) WOW…. So Meta
Link: https://ctflearn.com/challenge/348
You need another stego tool called ExifTool. This tool used to extract all the meta information from an image. This information can be the timestamp, location of the image being captured, software information and even sensitive data. Simply punch in the following command to extract the flag. (For Linux)
exiftool image.jpg
5) A CAPture of a Flag
Link: https://ctflearn.com/challenge/356
This task could be one of the hardest in the easy forensics category. You are required to use Wireshark to read the packet file. In the Wireshark, try to read the packet in the TCP stream. You can do this by right-click ant TCP or HTTP packet and locate to file –> TCP stream. As shown in the figure below.
After that, locate stream 5 on the HTTP request, you should find something interesting.
The message actually encoded with base64. Decode it with an online tool or Linux command.
Conclusion
That’s all for the easy forensic on the CTFlearn. The new write-up will be added to this post if I found any. I hope you learn something new, until next time ;).
tags: ctflearn - CTF - forensicsThanks for reading. Follow my twitter for latest update
If you like this post, consider a small donation. Much appreciated. :)