๐ŸŒ

Writeup JHDigitalCTF (John Hammond Digital CTF) 2019 Kategori [Forensics]

Sunday, 10 November 2019 | est. 1 min read | 0 Komentar
Tags : #ctf #jhdctf #Forensics
Share

A Brisk Stroll

80
Have you seen this image before?

Download the file below.
file : a_brisk_strool.jpg

command :

strings a_brisk_stroll.jpg| grep -i jhd

flag = JHDCTF{amongst_the_noise}


## QUACK ``` 90 We found this binary on a USB drive someone left lying around. There was a note attached, that read: โ€œyouโ€™re the one.โ€

Download the file below. file : inject.bin

after i googled, i found DuckToolkit. so first, we need to decode the inject.bin file using <a href="https://github.com/kevthehermit/DuckToolkit" target="_blank">kevthehermit/DuckToolkit</a>

```bash
python3 ducktools.py -d -l us ../inject.bin ../result.txt

and then i decode it using merricx/Enigmator :

foren-b64

and the file signature indicates that it's a JPEG image. so we use decode as file in Enigmator tools. and the result is : duck.jpg

Flag = JHDCTF{ducky_not_just_for_bath_tubs}
Comments