ASIS CTF 2021 Misc Writeup
ASIS CTF 2021 Misc Writeup
challenge-Factory:
1 | In the simplest terms, factory misco-graphy is the ratio of output to input! |
It is an easy stego challenge.Use foremost to solve it
flag:
1 | ASIS{PDF_1N_PDF_iZ_A_T4sK_fOR_fOreEnSic5_L0v3RS} |
challenge-Gesture:
1 | A gesture is a file that is intended to indicate or emphasize something! |
It is an interesting challenge.I can’t solve it in game.This is the recurrence work after the game
first use file
and binwalk
to check out this file
file:
binwalk:
wow you can find it is YAFFS
filesystem,It is a key to extract this img file
use https://github.com/justsoso8/yaffs2utils to extract it
such as ./unyaffs2
command:
1 | sudo ./unyaffs2 -p 512 /home/crazyman/Desktop/gesture.img Androidtmp |
result:
wow,we have already extract them,Now it’s time for us to analyze them
and we can find someting in Android/data/com.android.gallery3d/cache/.nomedia/.latentorism
As you know,cache is important in forensics.Meanwhile it is also the cache of gallery. So It is an picture.
rename it as png
we can see some number on it :D
but it looks strange.
aha This is the image that has been flipped left and right
Now repair it
script:
1 | import cv2 |
now we got 709004999298182874947842717955
but it seems not hex.What use are they for?
Don’t be worry,we will find another data.
look at Signal\Backups\
it has signal-2021-10-21-08-01-13.backup
what’s it ? how to decode it?
google is a good way to solve these :D
then,you can find it
https://github.com/pajowu/signal-backup-decode
install it and run the command to decode signal file
1 | signal-backup-decode -p 709004999298182874947842717955 signal-2021-10-21-08-01-13.backup |
file list:
now we will parse the signal_backup.db file
use SQLite Viewer to analyze the data
1 | SELECT * FROM sms; |
we can find morse code :D
1 | -. ...-- ...- . .-. ..--.- --... .-. ..- ..... - ..--.- - .---- -. . ..--.- ... . ...-- ..--.- .. ..--.- ....- ..--.- -. ----- - .... .---- -. -.... ..--.- .. ..... ..--.- .-.. ----- ----- ..--.- .--. ...-- .-. -.-. . -. --... ..--.- ... ...-- -.-. ..- .-. . |
decode morse
use http://www.hiencode.com/morse.html
flag:
1 | ASIS{n3ver_7ru5t_t1ne_se3_i_4_n0th1n6_i5_l00_p3rcen7_s3cure} |
Knowlege:
- extract YAFFS filesystem
- gallery image cache
- decode android signal backup
- parse and analyze data
Thanks for ASIS CTF.Nice challenge