Table of Contents
I played m0lecon CTF 2022 with my CTF team TEAM-ASGARD. These are the few challenges those i solved.
Crypto - Unrecognizable
The challenge contains these two images.
Immediately i wrote this script to make xor
of these two images.
from PIL import Image, ImageChops
im1 = Image.open('challenge.png')
im2 = Image.open('whoami.png')
im3 = ImageChops.add(ImageChops.subtract(im2, im1), ImageChops.subtract(im1, im2))
im3.save("im3.png")
Which gives new image consist of the flag in it.
Flag: ptm{y0u_r34lly_7r4c3d_m3}
Misc - f33linegCut3
The challenge contains this selfie.jpeg image.
Used exiftool
to read metadata. exiftool selfie.jpeg
and found this comment in metadata.
Comment:010101000110100001100101010011010110100101100111011010000111010001111001010100000110000101110111
Then I followed this Bin > Hex > Ascii
Using Cyberchef.
The result is of this is TheMightyPaw
Now I tried steghide extract -sf selfie.jpeg
and it results a mesage.zip
which is password protected.
Unzipped the message.zip
using TheMightyPaw
as the password. It gave us the flag.
Flag : ptm{n33d_M0r3_c4TN1p_b0ss}
Misc - FileRecover
In this challenge a capture.pcap
is attached.
By analyzing it in wireshark. I found that in one packet large size of data has been transmitted. I exported the packet data as the Image. The image contains the flag we need.
Flag : n37w0rk_ch4ll3n935_4r3_fun_2