We can see that the img725.jpg file has a different hash than the other images:
It turns out that this directory also contains files in other formats. These are: key.wav, n0t3.txt and nooope_not_here_gotta_try_harder.txt:
Let's display the contents of the files n0t3.txt and nooope_not_here_gotta_try_harder.txt:
szczygielka@hacks$ cat n0t3.txt
The flag is here somewhere. Keep Searching..
Tip: Use lowercase only
szczygielka@hacks$ cat nooope_not_here_gotta_try_harder.txt
KCTF{f4k3_fl46}
MORSECODETOTHERESCUE!!
Let's go back to the img725.jpg file. Visually, it does not seem to differ from other images. So we can use the steghide tool to check if another file is embedded in this image:
szczygielka@hacks$ steghide info img725.jpg
"img725.jpg":
format: jpeg
capacity: 8.0 KB
Try to get information about embedded data ? (y/n) y
Enter passphrase:
embedded file "flag.txt":
size: 47.0 Byte
encrypted: rijndael-128, cbc
compressed: yes
After entering morsecodetotherescue!! as the password, we can see that the flag.txt file is hidden in the img725.jpg file. Let's extract it using the following command:
szczygielka@hacks$ steghide extract -sf img725.jpg
Enter passphrase:
wrote extracted data to "flag.txt".
Let's display the contents of the flag.txt file using the cat command:
Apparently, the flag is here somewhere and we should keep looking for it. Let's analyze what's inside the key.wav file. After listening to the recording, we can assume thekey.wav file contains a message encoded using Morse code. We can try to decode it using website. After decoding the file contents, we receive the following message: