Challenge: (https://backdoor.sdslabs.co/challenges/STEGO)
Get the flag from here
Points: 10
We start off by downloading the file and running the normal file, strings, and binwalk commands against it.
Justin and I were doing this one together and while I was busy looking at in a Hex Editor, Justin mentioned that it may have been backwards (For the life of me, I can't remember why).
Well, I'll be damned.... I scroll to the bottom of my Hex Editor:
%PNG is the file header signature for a PNG image so to the google I go for a script to reverse a file. I found one written in python and give it a shot.
Well, there ya have it. Open the new file in your image viewer of choice and capture that flag!
Justin and I were doing this one together and while I was busy looking at in a Hex Editor, Justin mentioned that it may have been backwards (For the life of me, I can't remember why).
Well, I'll be damned.... I scroll to the bottom of my Hex Editor:
%PNG is the file header signature for a PNG image so to the google I go for a script to reverse a file. I found one written in python and give it a shot.
Well, there ya have it. Open the new file in your image viewer of choice and capture that flag!
No comments:
Post a Comment