Writeup JHDigitalCTF (John Hammond Digital CTF) 2019 Kategori [Forensics]
Sunday, 10 November 2019 | est. 1 min read | 0 Komentar
Tags :
#ctf
#jhdctf
#Forensics

A Brisk Stroll
80
Have you seen this image before?
Download the file below.
file : a_brisk_strool.jpg
command :
strings a_brisk_stroll.jpg| grep -i jhd
flag = JHDCTF{amongst_the_noise}
## QUACK ``` 90 We found this binary on a USB drive someone left lying around. There was a note attached, that read: โyouโre the one.โ
Download the file below. file : inject.bin
after i googled, i found DuckToolkit. so first, we need to decode the inject.bin file using <a href="https://github.com/kevthehermit/DuckToolkit" target="_blank">kevthehermit/DuckToolkit</a>
```bash
python3 ducktools.py -d -l us ../inject.bin ../result.txt
and then i decode it using merricx/Enigmator :
and the file signature indicates that it's a JPEG image. so we use decode as file in Enigmator tools.
and the result is :
Flag = JHDCTF{ducky_not_just_for_bath_tubs}