3c743dd8fd | ||
---|---|---|
.. | ||
README.md | ||
arched.png | ||
flag.zip | ||
meme.jpg |
README.md
Archenemy
The main idea finding the flag is using simple Steganography techniques.
Step-1:
After I downloaded arched.png
, I wasn't able to open it. So I tried simple strings, binwalk commands. But no results.
Step-2:
So, I went for steghide tool this time.
I tried steghide extract -sf arched.png
and with a empty passphrase and it gave me this:
wrote extracted data to "flag.zip".
Step-3:
So, now I had flag.zip
, which had an image meme.jpg
, but the zip was encrypted. So I had to use tool of that.
$ zipCracker/zipcracker.py -f flag.zip -w /usr/share/wordlists/rockyou.txt
3638 / 14344394 | 0.00% -> masones1lndg456ce
Password cracked: kathmandu
Took 2.379971 seconds to crack the password. That is, 1529 attempts per second.
Step-4:
Voila! We finally have meme.jpg
which contains flag.
Step-5:
Finally the flag becomes:
csictf{1_h0pe_y0u_don't_s33_m3_here}