This is my writeup for Wani CTF, an event organized by Osaka University CTF Club, Wani Hackase (Rank 304th)
Forensics #
Surveillance of sus #
A binary file is given, and after some investigation, it has a RDP8BMP Header.
To get the BMP images, I have referred to this article and use a Python Script (bmc-tools).
After all the bmp files are recovered, the flag can be readed in plain sight if the view is changed to “Large icons”.
Flag : FLAG{RDP_is_useful_yipeee}
Tiny USB #
A disk image file is given.
FTK Imager is used to read and analyze the disc file. After some digging, the flag is found!
Flag: FLAG{hey_i_just_bought_a_usb}
Tiny-10px #
A small image is given.
Based on my instincts, this could be one of those image steganography where the author resized the image of a large image.
So I followed the instructions of this article to recover the image by changing the hex values of height and width (multiple times).
After some effort, a message is visible from the image. (although reading it may take some time).
Flag: FLAG{b1g_en0ugh}
Conclusion #
This is my 6th CTF event participation, and I am happy that I can solve some easy to medium level challenges now!
Thank you for reading.