Skip to main content

Embedded

Forensics | Level 1 - Embedded

Challenge

We have recieved an image that is hiding something. See if you can find the secret.

Download Image

Solution

Solution Guide

This is a steganography challenge. There are many tools for steg challenges and usually involve trial & error. It's a good idea to first runs the Linux command strings on the file to see what we can find. If you run it on this file, you will see "flag.txt" towards the end. This suggests that there is a hidden file embedded in this PNG image! There are many tools to extract such files with the most common being Binwalk, Zsteg, Foremost, and Outguess (in that order). Let's start with binwalk.

To see potential hidden files inside a file, we can use the command binwalk <file>. Upon running this on our target image, you may see multiple files show up with the most notable being:

1022019       0xF9843         Zip archive data, at least v2.0 to extract, name: flag.txt

It seems that there is indeed a hidden file, specifically a Zip archive containing a flag.txt. We can extract the files with the command binwalk -e <file> which will send the extracted file to _<filename>.extracted. Inside, you will find the flag.txt with the flag!

This challenge is also solvable with the online tool Aperisolve that automates tools including Binwalk.

warning

Aperisolve has very unreliable uptime, especially during competitions. Learn to solve without it.

Credits

  • Author(s): Divesh Gupta (legendile7)