Home NahamCon CTF 2023 - Hidden Figures
Post
Cancel

NahamCon CTF 2023 - Hidden Figures

Info

NameDifficultyAuthor
Hidden FiguresEasyJohnHammond

Look at this fan page I made for the Hidden Figures movie and website! Not everything is what it seems!

Recon

When we enter the page we find a static page with nothing but images, text and a weird javascript file.

Main Page

The most striking thing is that all the images are loaded through a bunch of base64 code.

Base64 Source Code

Extracting the Flag

CyberChef

After looking around and not seeing anything else suspicious apart from the base64, let’s see if we can extract anything from it using CyberChef.

CyberChef Flag

Perfect! one of the images contained the flag.

Binwalk

Before trying the extraction with CyberChef, I tried with binwalk -e without any result, so far I am not sure why it could be, maybe the embedded file might be fragmented or stored in a non-contiguous manner within the input file.

But with this other way of using binwalk, we can successfully extract the flag just like with CyberChef.

1
2
3
4
5
6
7
8
9
10
$ binwalk -D=".*" image.jpeg       

DECIMAL       HEXADECIMAL     DESCRIPTION
--------------------------------------------------------------------------------
0             0x0             JPEG image data, JFIF standard 1.01
15486         0x3C7E          PNG image, 1851 x 174, 8-bit/color RGB, non-interlaced
15527         0x3CA7          Zlib compressed data, default compression

$ file 3C7E 
3C7E: PNG image data, 1851 x 174, 8-bit/color RGB, non-interlaced

Final Thoughts

It was not a bad challenge, but I was expecting something more web, it was really a steganography challenge, but I learned more binwalk options and how to extract files with CyberChef.

This post is licensed under CC BY 4.0 by the author.