TV : Jean s'est fait plaisir en mélant plusieurs techniques de stégano pour ce chall

First, let’s take a look at the file :

It’s a wav audio file with the generic of the media TF1, let’s see if there are some metadata in this file :

We have the comment “STEGanography loves to HIDE”, if we just take the letters in UPPERCASE we have the word STEGHIDE. Ok we will use steghide, and what about the password ?

The name of the event is HackSécuReims, and the format flag for every challenge is URCACTF{flag}, so let’s try with some words like this :

HackSécuReims
HackSecureims
HSR
hsr
URCACTF
urcactf
...

Use this command :

steghide extract -sf tf1-jt.wav

Result :

The password was URCACTF. If we analyse the file pass.txt we have a base64 string, so let’s decode it with this command :

cat pass.txt|base64 -d > file_pass_txt

If we take a look a the file :

It’s a JPEG file, so open it :

We have some passwords written into a notepad. But what can I do with this ? Return to the wav file. We try the binwalk command in order to find some other file.

binwalk --dd=".*" tf1-jt.wav

Result:

There is a ZIP archive who contain another wav whose name is tv.wav. Let’s try to unzip the file :

We have to find a password, so I’ll try the passwords that are written on the notepad found above :

My password
123456
qwerty
Re8!te3=

The password of the zip file was Re8!te3=. Let’s take a look at those new files :

It’s another wav, but if we listen carefully, seems like a minitel sound. After that, we remember about a ECW challenge : Link Here

So we put the sound into a Windows VM and run the sound with the tool RX-SSTV. And we can view the flag :

Flag : URCACTF{gu3ss_w1th_SSTV}


TheFlagIsNotHere

CTF team