Whispers of the Feathered Messenger
In a world where secrets flutter through the air, the bluehen carries a hidden message. A message that has been salted…. however its still a message… maybe the bluehen ignores the salt. This image holds more than meets the eye.
shasum: e717eefe9b41212b017152756b0e640f9a4f3763 bird.jpeg
- Category: forensic
- Challenge file: bird.jpeg
This is the image of bird.jpeg:
Solution:
1. View the image metadata with exiftool
$ exiftool bird.jpeg
ExifTool Version Number : 13.02
File Name : bird.jpeg
Directory : .
File Size : 323 kB
File Modification Date/Time : 2024:11:12 06:18:37+00:00
File Access Date/Time : 2024:11:12 06:18:32+00:00
File Inode Change Date/Time : 2024:11:12 06:18:40+00:00
File Permissions : -rw-r--r--
File Type : JPEG
File Type Extension : jpg
MIME Type : image/jpeg
JFIF Version : 1.01
Resolution Unit : None
X Resolution : 72
Y Resolution : 72
Comment : UGFzc3dvcmQ6IDVCNEA3cTchckVc
Image Width : 1080
Image Height : 1350
Encoding Process : Baseline DCT, Huffman coding
Bits Per Sample : 8
Color Components : 3
Y Cb Cr Sub Sampling : YCbCr4:2:0 (2 2)
Image Size : 1080x1350
Megapixels : 1.5
There is a base64 encoded string as the comment, decode it
$ echo "UGFzc3dvcmQ6IDVCNEA3cTchckVc" | base64 -d
Password: 5B4@7q7!rE\
Based on the output, I suspect it uses steghide
to embedded files with the password
2. Use steghide to extract the hidden files
Here is the commmand to extract hidden files with steghide
$ steghide extract -sf bird.jpeg
Enter passphrase: {use the password from the comment}
wrote extracted data to "encrypted_flag.bin".
3. Verify the file type of the bin
$ file encrypted_flag.bin
encrypted_flag.bin: openssl enc'd data with salted password
This file is encrypted, to view it we can use the same password as before
4. Decrypted encrypted_flag.bin
Here is how to decrypt with openssl
$ openssl enc -d -aes-256-cbc -in encrypted_flag.bin -out decrypted_flag.txt
Flag: UDCTF{m0AybE_YoR3$!_a_f0recnicsEs_3xpEr^t}