hideme
- Description: Every file gets a flag. The SOC analyst saw one image been sent back and forth between two people. They decided to investigate and found out that there was more than what meets the eye here.
- Difficulty: Medium
🔎 Solution
With the provided image file, we utilized binwalk
to extract embedded data. The analysis revealed a hidden file located at secret/flag.png
.
┌──(kali㉿kali)-[~/Desktop]
└─$ binwalk -e flag.png
DECIMAL HEXADECIMAL DESCRIPTION
--------------------------------------------------------------------------------
41 0x29 Zlib compressed data, compressed
39739 0x9B3B Zip archive data, at least v1.0 to extract, name: secret/
39804 0x9B7C Zip archive data, at least v2.0 to extract, compressed size: 2884, uncompressed size: 3038, name: secret/flag.png
WARNING: One or more files failed to extract: either no utility was found or it's unimplemented
Upon opening flag.png
, we successfully retrieved the flag content.
🚩Flag
picoCTF{Hiddinng_An_imag3_within_@n_ima9e_82101824}