본문 바로가기
반응형

<개인공부> - IT79

Pragyan CTF 19' Write-up / Welcome I tried this problem at first as its subject is welcome, however, I had a really hard time to solve this problem. My approach is as below. First, I assumed that it has a hidden message so I used steganography decoder right away. BUT, it has no hidden message. Afterward, I simply used fundamental forensics tools such as file and binwalk. 1) file command $ file welcome.jpeg welcome.jpeg: JPEG imag.. 2019. 3. 18.
UTCTF 19' Write-up / Low Sodium Bagel This one is also an interesting problem. I downloaded a picture from the server and I opened it. I could see a bagel image. Actually, I am a newbie of CTF competition so whenever I see the picture I always have an assumption that picture has a hidden message, which is steganography. So I tried to decode it. There are tons of steganographic decoder website, however, below one only supports jpeg f.. 2019. 3. 15.
UTCTF 19' Write-up / [basics] forensics [basics] forensics100My friend said they hid a flag in this picture, but it's broken!by balex This problem is the last one for the beginner. I downloaded the secret.jpg file, however, I couldn't open it. I just got "file cannot be readable" error message. So I checked the file type on linux environment (Actually, I use WSL, Windows Subsystem for Linux). And then, I found out the file's extension.. 2019. 3. 15.
UTCTF 19' Write-up / [basics] re [basics] re100I know there's a string in this binary somewhere.... Now where did I leave it?by balex This problem was really easy one if you know the usage of IDA application. I just opened the file and I got flag right away.Flag : utflag{str1ng5_15_4_h4ndy_t00l} Reference site : https://utctf.live/challenges#[basics]%20re 2019. 3. 15.
반응형