Snowy Rock
DESCRIPTION
am loves puzzles and his dad working in alaska sent a message hidden within for him to uncover. Can you decode it? Author: Rakhul FLAG FORMAT: dsc{[a-zA-Z0-9_]+}
Solution
Running
strings
on the jpg provided we see there is asnowyrock.txt
embedded in itWe can extract it using
binwalk -e snowy_rock_fi.jpg
We get a encrypted zip file
We can crack it using
John the Ripper
and using therockyou
wordlistzip2john 3CA15.zip > zip.hash
john zip.hash -w=/usr/share/wordlists/rockyou.txt
┌──(kali㉿kali)-[~/…/Writeups/DeconstruCTF 2023/Snowy-Rock/_snowy_rock_fi.jpg.extracted]
└─$ john zip.hash -w=/usr/share/wordlists/rockyou.txt
Using default input encoding: UTF-8
Loaded 1 password hash (PKZIP [32/64])
Will run 4 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
11snowbird (3CA15.zip/snowyrock.txt)
1g 0:00:00:01 DONE (2023-08-07 15:16) 0.6666g/s 8918Kp/s 8918Kc/s 8918KC/s 1208417808..11ppt06895s
Use the "--show" option to display all of the cracked passwords reliably
Session completed.
We get the password as
11snowbird
extracting
snowyrock.txt
using the password, we find whitespaces in itStegsnow can deal with whitespaces
stegsnow -C snowyrock.txt
We get a base64 encoded string:
OFTHA62GMFBGUX3FIJYFQZS7ONBGKX3FGM2HS7I=
which decodes toqfp{FaBj_eBpXf_sBe_e34y}
Then we rot13 decode it to get the flag
┌──(kali㉿kali)-[~/…/Writeups/DeconstruCTF 2023/Snowy-Rock/_snowy_rock_fi.jpg.extracted]
└─$ echo "qfp{FaBj_eBpXf_sBe_e34y}" | rot13
dsc{SnOw_rOcKs_fOr_r34l}
FLAG:
dsc{SnOw_rOcKs_fOr_r34l}
Last updated