3DS CTF was an interesting CTF, which unlike normal CTFs, went on for a whole week. I had plenty of time to enjoy the challenges. Below are write-ups for some of them.
Stego 100: Excaliflag
Playing with the blue bits in Steganabara's Bit Mask Filter and you'll get the flag:
Stego 300: 0liver "Imaged"
By looking at the magic bytes in the binary data, it's easy to see that there is a png image appended at the end of the jpg image. Looking at the png image, it's clear that the flag is hidden in the R and G values of the first few lines. Extract the R and G values and you'll get an ELF file that prints out the flag.
Stego 300: We also have memes!
The flag is hidden in the image using an algorithm in which p and offset are unknown. However, they are small enough to be brute-forced. The flag format is 3DS{}, so this is more like a known plain-text attack with the image as the ciphertext.
(to be continued)
Update: not continued because it's been a long time and I don't remember the continuation. Also, I'm busy (and lazy :P)
1 comment:
Haha, I’ve been busy
Post a Comment