Archenemy

点击此处获得更好的阅读体验


WriteUp来源

https://dunsp4rce.github.io/csictf-2020/forensics/2020/07/19/Archenemy.html

by INXS_JOY

题目描述

John likes Arch Linux. What is he hiding?

题目考点

解题思路

Its always a good practice to check the file format of all files while doing Forensics. I used the command file arched.png to check the file type. As suspected, I got this,

1
arched.png: JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 1920x1080, components 3

So arched.png is a JPEG file. Let's change the extension to .jpeg

Next, I ran the image file through Stego-Toolkit and noticed that steghide found a embedded flag.zip file in the image.

Trying to unzip the flag.zip asks for a password, but we weren't provided with any passwords. So I tried to brute force the password using fcrackzip.

Fcrackzip tries all the passwords from any word-list we provide. In this case I used rockyou word-list which is a list of common passwords.

Using the command, fcrackzip -v -u -D -p /usr/share/wordlists/rockyou.txt flag.zip, we get the following output,

1
2
found file 'meme.jpg', (size cp/uc  27553/ 27752, flags 9, chk 9ed1)
PASSWORD FOUND!!!!: pw == kathmandu

So, the password for the flag.zip is kathmandu. Extracting the contents, we get a file meme.jpg. Opening it, we find the flag at the bottom of the image.

Flag

1
csictf{1_h0pe_y0u_don't_s33_m3_here}