Snowy Rock
DESCRIPTION
am loves puzzles and his dad working in alaska sent a message hidden within for him to uncover. Can you decode it? Author: Rakhul FLAG FORMAT: dsc{[a-zA-Z0-9_]+}
Solution
Running
stringson the jpg provided we see there is asnowyrock.txtembedded in itWe can extract it using
binwalk -e snowy_rock_fi.jpgWe get a encrypted zip file
We can crack it using
John the Ripperand using therockyouwordlistzip2john 3CA15.zip > zip.hashjohn zip.hash -w=/usr/share/wordlists/rockyou.txt
┌──(kali㉿kali)-[~/…/Writeups/DeconstruCTF 2023/Snowy-Rock/_snowy_rock_fi.jpg.extracted]
└─$ john zip.hash -w=/usr/share/wordlists/rockyou.txt
Using default input encoding: UTF-8
Loaded 1 password hash (PKZIP [32/64])
Will run 4 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
11snowbird (3CA15.zip/snowyrock.txt)
1g 0:00:00:01 DONE (2023-08-07 15:16) 0.6666g/s 8918Kp/s 8918Kc/s 8918KC/s 1208417808..11ppt06895s
Use the "--show" option to display all of the cracked passwords reliably
Session completed.We get the password as
11snowbirdextracting
snowyrock.txtusing the password, we find whitespaces in itStegsnow can deal with whitespaces
stegsnow -C snowyrock.txtWe get a base64 encoded string:
OFTHA62GMFBGUX3FIJYFQZS7ONBGKX3FGM2HS7I=which decodes toqfp{FaBj_eBpXf_sBe_e34y}Then we rot13 decode it to get the flag
┌──(kali㉿kali)-[~/…/Writeups/DeconstruCTF 2023/Snowy-Rock/_snowy_rock_fi.jpg.extracted]
└─$ echo "qfp{FaBj_eBpXf_sBe_e34y}" | rot13
dsc{SnOw_rOcKs_fOr_r34l}FLAG:
dsc{SnOw_rOcKs_fOr_r34l}
Last updated