ctf-writeup/2023/BlueHens CTF 2023/Big JPG/README.md

24 lines
759 B
Markdown
Raw Normal View History

2023-10-30 11:43:47 +00:00
# Big JPG
> There's more data to this image than what meets the eye.
## About the Challenge
We were given a `jpg` file and we need to find the flag inside the image
## How to Solve?
First, run binwalk or you can use CyberChef and then choose `Extract File` operator. You will see a `xz` file
![binwalk](images/binwalk.png)
Open the `xz` file and you will find 2 images called `key.png` and `flag.jpg`. Input the `key.png` file into AperiSolve or you can `zsteg` tool to extract the key
![zsteg](images/zsteg.png)
You got the password! And right now you can use `steghide` or AperiSolve again but don't forget to input `uR_aLmOsT_tHeRe` in the form input
![steghide](images/steghide.png)
2023-11-19 11:34:28 +00:00
Download the result and voilà!
2023-10-30 11:43:47 +00:00
```
UDCTF{lay3r5_0n_lay3r5}
```