🔴Lecture_22_Forensics

Challenge Description

My professor told me I might find something useful in these slides... Lecture_22__Forensics.pdf


We are given a PDF file to download.

The first thing I always do when I get a PDF file in a CTF challenge is the pdftotext command , It basically converts the pdf to plain text

pdftotext Lecture_22__Forensics.pdf output.txt

Untitled

We stored our output in an output.txt file that if we take a look at it we can see our flag.

Untitled

Flag : wsc{y0u_c4nT_$ee_m3}

🔴Forensics...kinda

Challenge Description

This image has been a bit shifty - can't seem to find the message my friend encoded in it! Forensics_kinda.png


We are given a png file to work with.

The first thing I tried was zsteg ( I always use this command when working with png files ). It’s a Command-line tool for use against Least Significant Bit steganography... unfortunately only works against PNG and BMP images. You can get it from here https://github.com/zed-0xff/zsteg

zsteg Forensics_kinda.png

Untitled